{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:15Z","timestamp":1750220895304,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,12]]},"DOI":"10.1145\/3360774.3360781","type":"proceedings-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:56:00Z","timestamp":1580741760000},"page":"100-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MultiLock"],"prefix":"10.1145","author":[{"given":"Shravan","family":"Aras","sequence":"first","affiliation":[{"name":"University of Arizona"}]},{"given":"Chris","family":"Gniady","sequence":"additional","affiliation":[{"name":"University of Arizona"}]},{"given":"Hari","family":"Venugopalan","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2037","article-title":"Face description with local binary patterns: Application to face recognition. Pattern Analysis and Machine Intelligence","volume":"28","author":"Ahonen Timo","year":"2006","unstructured":"Timo Ahonen , Abdenour Hadid , and Matti Pietikainen . 2006 . Face description with local binary patterns: Application to face recognition. Pattern Analysis and Machine Intelligence , IEEE Transactions on 28 , 12 (2006), 2037 -- 2041 . Timo Ahonen, Abdenour Hadid, and Matti Pietikainen. 2006. Face description with local binary patterns: Application to face recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on 28, 12 (2006), 2037--2041.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Hadid A. Ahonen T. and Pietikainen. 2004. Face Recognition with Local Binary Patterns. Computer Vision. (2004).  Hadid A. Ahonen T. and Pietikainen. 2004. Face Recognition with Local Binary Patterns. Computer Vision. (2004).","DOI":"10.1007\/978-3-540-24670-1_36"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037442"},{"key":"e_1_3_2_1_4_1","first-page":"13","article-title":"Biometric authentication: A review. International Journal of u-and e-Service","volume":"2","author":"Bhattacharyya Debnath","year":"2009","unstructured":"Debnath Bhattacharyya , Rahul Ranjan , Farkhod Alisherov , and Minkyu Choi . 2009 . Biometric authentication: A review. International Journal of u-and e-Service , Science and Technology 2 , 3 (2009), 13 -- 28 . Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov, and Minkyu Choi. 2009. Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology 2, 3 (2009), 13--28.","journal-title":"Science and Technology"},{"key":"e_1_3_2_1_5_1","unstructured":"Frank Breitinger and Claudia Nickel. 2010. User Survey on Phone Security and Usage.. In BIOSIG. 139--144.  Frank Breitinger and Claudia Nickel. 2010. User Survey on Phone Security and Usage.. In BIOSIG. 139--144."},{"key":"e_1_3_2_1_6_1","unstructured":"John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189 194 (1996) 4--7.  John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189 194 (1996) 4--7."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.927467"},{"volume-title":"Security and usability: designing secure systems that people can use. \"O'Reilly Media","author":"Cranor Lorrie Faith","key":"e_1_3_2_1_8_1","unstructured":"Lorrie Faith Cranor and Simson Garfinkel . 2005. Security and usability: designing secure systems that people can use. \"O'Reilly Media , Inc .\". Lorrie Faith Cranor and Simson Garfinkel. 2005. Security and usability: designing secure systems that people can use. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2010 International Conference on. IEEE, 1--10","author":"D\u00f6rflinger Tim","year":"2010","unstructured":"Tim D\u00f6rflinger , Anna Voth , Juliane Kr\u00e4mer , and Ronald Fromm . 2010 . \" My smartphone is a safe!\" The user's point of view regarding novel authentication methods and gradual security levels on smartphones. In Security and Cryptography (SECRYPT) , Proceedings of the 2010 International Conference on. IEEE, 1--10 . Tim D\u00f6rflinger, Anna Voth, Juliane Kr\u00e4mer, and Ronald Fromm. 2010. \"My smartphone is a safe!\" The user's point of view regarding novel authentication methods and gradual security levels on smartphones. In Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on. IEEE, 1--10."},{"key":"e_1_3_2_1_10_1","volume-title":"Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In Mobile Computing, Applications, and Services","author":"Draffin Benjamin","year":"2013","unstructured":"Benjamin Draffin , Jiang Zhu , and Joy Zhang . 2013 . Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In Mobile Computing, Applications, and Services . Springer , 184--201. Benjamin Draffin, Jiang Zhu, and Joy Zhang. 2013. Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In Mobile Computing, Applications, and Services. Springer, 184--201."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.106"},{"key":"e_1_3_2_1_14_1","first-page":"18","article-title":"Support vector machines. Intelligent Systems and their Applications","volume":"13","author":"Hearst Marti A.","year":"1998","unstructured":"Marti A. Hearst , Susan T Dumais , Edgar Osman , John Platt , and Bernhard Scholkopf . 1998 . Support vector machines. Intelligent Systems and their Applications , IEEE 13 , 4 (1998), 18 -- 28 . Marti A. Hearst, Susan T Dumais, Edgar Osman, John Platt, and Bernhard Scholkopf. 1998. Support vector machines. Intelligent Systems and their Applications, IEEE 13, 4 (1998), 18--28.","journal-title":"IEEE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903052"},{"key":"e_1_3_2_1_16_1","volume-title":"The MUCT landmarked face database","author":"Milborrow Stephen","year":"2010","unstructured":"Stephen Milborrow , John Morkel , and Fred Nicolls . 2010. The MUCT landmarked face database . Pattern Recognition Association of South Africa 201, 0 ( 2010 ). Stephen Milborrow, John Morkel, and Fred Nicolls. 2010. The MUCT landmarked face database. Pattern Recognition Association of South Africa 201, 0 (2010)."},{"volume-title":"SPIE Defense, Security, and Sensing","author":"Niinuma Koichiro","key":"e_1_3_2_1_17_1","unstructured":"Koichiro Niinuma and Anil K Jain . 2010. Continuous user authentication using temporal information . In SPIE Defense, Security, and Sensing . International Society for Optics and Photonics , 76670L--76670L. Koichiro Niinuma and Anil K Jain. 2010. Continuous user authentication using temporal information. In SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 76670L--76670L."},{"key":"e_1_3_2_1_18_1","unstructured":"opencv dev team. 2018. Open Computer Vision Android SDK. http:\/\/docs.opencv.org\/2.4\/doc\/tutorials\/introduction\/android_binary_package\/O4A_SDK.html. (2018).  opencv dev team. 2018. Open Computer Vision Android SDK. http:\/\/docs.opencv.org\/2.4\/doc\/tutorials\/introduction\/android_binary_package\/O4A_SDK.html. (2018)."},{"key":"e_1_3_2_1_19_1","unstructured":"opencv dev team. 2018. Open Computer Vision Library. http:\/\/opencv.org\/. (2018).  opencv dev team. 2018. Open Computer Vision Library. http:\/\/opencv.org\/. (2018)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361061"},{"key":"e_1_3_2_1_21_1","volume-title":"Networking and Communications (WiMob), 2011 IEEE 7th International Conference on. IEEE, 141--148","author":"Shi Weidong","year":"2011","unstructured":"Weidong Shi , Feng Yang , Yifei Jiang , Feng Yang , and Yingen Xiong . 2011 . Sen-guard: Passive user identification on smartphones using multiple sensors. In Wireless and Mobile Computing , Networking and Communications (WiMob), 2011 IEEE 7th International Conference on. IEEE, 141--148 . Weidong Shi, Feng Yang, Yifei Jiang, Feng Yang, and Yingen Xiong. 2011. Sen-guard: Passive user identification on smartphones using multiple sensors. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference on. IEEE, 141--148."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Ben Shneiderman and Catherine Plaisant. 1987. Designing the user interface: Strategies for effective human-computer interaction. (1987).  Ben Shneiderman and Catherine Plaisant. 1987. Designing the user interface: Strategies for effective human-computer interaction. (1987).","DOI":"10.1145\/25065.950626"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"e_1_3_2_1_24_1","unstructured":"M. Turk and A. Pentland. 1991. Eigenfaces for Face Detection\/Recognition. (1991).  M. Turk and A. Pentland. 1991. Eigenfaces for Face Detection\/Recognition. (1991)."},{"key":"e_1_3_2_1_25_1","volume-title":"Symposium On Usable Privacy and Security (SOUPS","author":"Xu Hui","year":"2014","unstructured":"Hui Xu , Yangfan Zhou , and Michael R Lyu . 2014 . Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones . In Symposium On Usable Privacy and Security (SOUPS 2014). 187--198. Hui Xu, Yangfan Zhou, and Michael R Lyu. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Symposium On Usable Privacy and Security (SOUPS 2014). 187--198."},{"key":"e_1_3_2_1_26_1","volume-title":"Networking and Communications (ICNC), 2013 International Conference on. IEEE, 1128--1133","author":"Zhu Jiang","year":"2013","unstructured":"Jiang Zhu , Pang Wu , Xiao Wang , and Juyong Zhang . 2013 . Sensec: Mobile security through passive sensing. In Computing , Networking and Communications (ICNC), 2013 International Conference on. IEEE, 1128--1133 . Jiang Zhu, Pang Wu, Xiao Wang, and Juyong Zhang. 2013. Sensec: Mobile security through passive sensing. In Computing, Networking and Communications (ICNC), 2013 International Conference on. IEEE, 1128--1133."}],"event":{"name":"MobiQuitous: Computing, Networking and Services","acronym":"MobiQuitous","location":"Houston Texas USA"},"container-title":["Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3360781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360774.3360781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3360781"}},"subtitle":["biometric-based graded authentication for mobile devices"],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":26,"alternative-id":["10.1145\/3360774.3360781","10.1145\/3360774"],"URL":"https:\/\/doi.org\/10.1145\/3360774.3360781","relation":{},"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"2020-02-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}