{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:32:22Z","timestamp":1776785542418,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3365921.3365923","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T09:35:56Z","timestamp":1582364156000},"page":"117-126","source":"Crossref","is-referenced-by-count":6,"title":["CORMORANT"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Hintze","sequence":"first","affiliation":[{"name":"Johannes Kepler University Linz, Linz, Austria"}]},{"given":"Matthias","family":"F\u00fcller","sequence":"additional","affiliation":[{"name":"FHDW Paderborn, Paderborn, Germany"}]},{"given":"Sebastian","family":"Scholz","sequence":"additional","affiliation":[{"name":"FHDW Paderborn, Paderborn, Germany"}]},{"given":"Rainhard D.","family":"Findling","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"given":"Muhammad","family":"Muaaz","sequence":"additional","affiliation":[{"name":"Johannes Kepler University Linz, Linz, Austria"}]},{"given":"Philipp","family":"Kapfer","sequence":"additional","affiliation":[{"name":"Johannes Kepler University Linz, Linz, Austria"}]},{"given":"Wilhelm","family":"N\u00fc\u00dfer","sequence":"additional","affiliation":[{"name":"FHDW Paderborn, Paderborn, Germany"}]},{"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[{"name":"Johannes Kepler University Linz, Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Yusuf Albayram etal 2017. \"...better to use a lock screen than to worry about saving a few seconds of time\": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In SOUPS. 49--63.  Yusuf Albayram et al. 2017. \"...better to use a lock screen than to worry about saving a few seconds of time\": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In SOUPS. 49--63."},{"key":"e_1_3_2_1_2_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). 1--5.","author":"Aman Sayedul","year":"2016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Fr\u00e9d\u00e9ric Bimbot etal 2004. A Tutorial on Text-independent Speaker Verification. EURASIP J. Appl. Signal Process. 2004 (Jan. 2004) 430--451.  Fr\u00e9d\u00e9ric Bimbot et al. 2004. A Tutorial on Text-independent Speaker Verification. EURASIP J. Appl. Signal Process. 2004 (Jan. 2004) 430--451.","DOI":"10.1155\/S1110865704310024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287036"},{"key":"e_1_3_2_1_5_1","unstructured":"Richard Chow Philippe J. P. Golle and Jessica N. Staddon. 2012. Adjusting security level of mobile device based on presence or absence of other mobile devices nearby.  Richard Chow Philippe J. P. Golle and Jessica N. Staddon. 2012. Adjusting security level of mobile device based on presence or absence of other mobile devices nearby."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.27"},{"key":"e_1_3_2_1_7_1","unstructured":"Heather Crawford Karen Renaud and Tim Storer. 2013. A framework for continuous transparent mobile device authentication. Computers and Security 39 PART B (2013) 127--136.  Heather Crawford Karen Renaud and Tim Storer. 2013. A framework for continuous transparent mobile device authentication. Computers and Security 39 PART B (2013) 127--136."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/0524031"},{"key":"e_1_3_2_1_9_1","unstructured":"Mohammad Omar Derawi. 2012. Smartphones and Biometrics: Gait and Activity Recognition. Ph.D. Dissertation. Gj\u00f8vik University College.  Mohammad Omar Derawi. 2012. Smartphones and Biometrics: Gait and Activity Recognition. Ph.D. Dissertation. Gj\u00f8vik University College."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_3_2_1_11_1","unstructured":"Rainhard D. Findling. 2013. Pan Shot Face Unlock: Towards Unlocking Personal Mobile Devices using Stereo Vision and Biometric Face Information from multiple Perspectives. Master's thesis. University of Applied Sciences Upper Austria Hagenberg Austria.  Rainhard D. Findling. 2013. Pan Shot Face Unlock: Towards Unlocking Personal Mobile Devices using Stereo Vision and Biometric Face Information from multiple Perspectives. Master's thesis. University of Applied Sciences Upper Austria Hagenberg Austria."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2812883"},{"key":"e_1_3_2_1_13_1","unstructured":"Rainhard D. Findling and Ren\u00e9 Mayrhofer. 2013. Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices. International Journal of Pervasive Computing and Communications (2013) 190--208.  Rainhard D. Findling and Ren\u00e9 Mayrhofer. 2013. Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices. International Journal of Pervasive Computing and Communications (2013) 190--208."},{"key":"e_1_3_2_1_14_1","unstructured":"Dawud Gordon John Tanios and Oleksii Levkovskyi. 2019. Deep Learning for Behavior-Based Invisible Multi-Factor Authentication. https:\/\/patents.justia.com\/patent\/20190044942  Dawud Gordon John Tanios and Oleksii Levkovskyi. 2019. Deep Learning for Behavior-Based Invisible Multi-Factor Authentication. https:\/\/patents.justia.com\/patent\/20190044942"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/iUSEr.2011.6150566"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_2_1_17_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Harbach Marian","year":"2014"},{"key":"e_1_3_2_1_18_1","volume-title":"Ephemeral Identifiers: Mitigating Tracking & Spoofing Threats to BLE Beacons.","author":"Hassidim Avinatan","year":"2016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501607"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Daniel Hintze. 2015. Towards transparent multi-device-authentication. In UbiComp\/ISWC'15 Adjunct. ACM 435--440.  Daniel Hintze. 2015. Towards transparent multi-device-authentication. In UbiComp\/ISWC'15 Adjunct. ACM 435--440.","DOI":"10.1145\/2800835.2801644"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2800835.2800906"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351243"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090078"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837126.2843845"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2971448"},{"key":"e_1_3_2_1_26_1","unstructured":"Christopher G. Hocking etal 2011. Authentication Aura-A distributed approach to user authentication. Information Assurance and Security 6 2 (2011).  Christopher G. Hocking et al. 2011. Authentication Aura-A distributed approach to user authentication. Information Assurance and Security 6 2 (2011)."},{"key":"e_1_3_2_1_27_1","volume-title":"Architecture of Context-Risk-Aware Authentication System for Web Environments. ICIEIS'2014","author":"Hurkala Adam","year":"2014"},{"key":"e_1_3_2_1_28_1","unstructured":"Markus Jakobsson etal 2009. Implicit authentication for mobile devices. Hot-Sec'09 (2009).  Markus Jakobsson et al. 2009. Implicit authentication for mobile devices. Hot-Sec'09 (2009)."},{"key":"e_1_3_2_1_29_1","unstructured":"Philipp Kapfer. 2016. PhonyKeyboard: Sensor-enhanced Keystroke Dynamics Authentication on Mobile Devices. Master Thesis. Johannes Kepler University Linz.  Philipp Kapfer. 2016. PhonyKeyboard: Sensor-enhanced Keystroke Dynamics Authentication on Mobile Devices. Master Thesis. Johannes Kepler University Linz."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639141"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5681156"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TPAMI.2005.92","article-title":"Acquiring linear subspaces for face recognition under variable lighting","volume":"27","author":"Lee Kuang-Chih","year":"2005","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_34_1","volume-title":"An Extended Set of Haar-Like Features for Rapid Object Detection. In IEEE International Conference on Image Processing","author":"Lienhart Rainer","year":"2002"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982190"},{"key":"e_1_3_2_1_36_1","unstructured":"Ren\u00e9 Mayrhofer etal 2019. The Android Platform Security Model. CoRR abs\/1904.05572 (2019). arXiv:1904.05572 http:\/\/arxiv.org\/abs\/1904.05572  Ren\u00e9 Mayrhofer et al. 2019. The Android Platform Security Model. CoRR abs\/1904.05572 (2019). arXiv:1904.05572 http:\/\/arxiv.org\/abs\/1904.05572"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684152"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"e_1_3_2_1_39_1","unstructured":"Claudia Nickel. 2012. Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones. Ph.D. Dissertation. TU Darmstadt.  Claudia Nickel. 2012. Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones. Ph.D. Dissertation. TU Darmstadt."},{"key":"e_1_3_2_1_40_1","unstructured":"Open Whisper Systems. 2018. Signal Specification. https:\/\/signal.org\/docs\/  Open Whisper Systems. 2018. Signal Specification. https:\/\/signal.org\/docs\/"},{"key":"e_1_3_2_1_41_1","unstructured":"OSGi Alliance. 2004. Listeners Considered Harmful: The Whiteboard Pattern. (2004) 16 pages.  OSGi Alliance. 2004. Listeners Considered Harmful: The Whiteboard Pattern. (2004) 16 pages."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 21st USENIX Security Symposium","author":"Riva Oriana","year":"2011"},{"key":"e_1_3_2_1_44_1","unstructured":"Arun Ross and Anil K Jain. 2004. Multimodal Biometrics: an Overview. Signal Processing September (2004) 1221--1224.  Arun Ross and Anil K Jain. 2004. Multimodal Biometrics: an Overview. Signal Processing September (2004) 1221--1224."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.109"},{"key":"e_1_3_2_1_47_1","unstructured":"Signal Messenger. 2016. Facebook Messenger deploys Signal Protocol for end-to-end encryption. (2016). https:\/\/signal.org\/blog\/facebook-messenger  Signal Messenger. 2016. Facebook Messenger deploys Signal Protocol for end-to-end encryption. (2016). https:\/\/signal.org\/blog\/facebook-messenger"},{"key":"e_1_3_2_1_48_1","unstructured":"Signal Messenger. 2016. Open Whisper Systems partners with Google onend-to-end encryption for Allo. (2016). https:\/\/signal.org\/blog\/allo\/  Signal Messenger. 2016. Open Whisper Systems partners with Google onend-to-end encryption for Allo. (2016). https:\/\/signal.org\/blog\/allo\/"},{"key":"e_1_3_2_1_49_1","unstructured":"Signal Messenger. 2016. WhatsApp's Signal Protocol integration is now complete. (2016). https:\/\/signal.org\/blog\/whatsapp-complete  Signal Messenger. 2016. WhatsApp's Signal Protocol integration is now complete. (2016). https:\/\/signal.org\/blog\/whatsapp-complete"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.051"},{"key":"e_1_3_2_1_51_1","volume-title":"Pico: No more passwords! Lecture Notes in Computer Science 7114 LNCS","author":"Stajano Frank","year":"2011"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264946"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2478564.2479058"},{"key":"e_1_3_2_1_54_1","volume-title":"Amigo: Proximity-Based Authentication of Mobile Devices. In UbiComp 2007: Ubiquitous Computing.","author":"Varshavsky Alex","year":"2007"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of these 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition 1","author":"Viola P.","year":"2001"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264950"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"}],"event":{"name":"MoMM2019: The 17th International Conference on Advances in Mobile Computing & Multimedia","location":"Munich Germany","acronym":"MoMM2019","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"]},"container-title":["Proceedings of the 17th International Conference on Advances in Mobile Computing &amp; Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365921.3365923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:37Z","timestamp":1750202617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365923"}},"subtitle":["On Implementing Risk-Aware Multi-Modal Biometric Cross-Device Authentication For Android"],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":57,"alternative-id":["10.1145\/3365921.3365923","10.1145\/3365921"],"URL":"https:\/\/doi.org\/10.1145\/3365921.3365923","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]}}}