{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:54Z","timestamp":1750220754612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,19]]},"DOI":"10.1145\/3407982.3408021","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T05:02:40Z","timestamp":1598418160000},"page":"35-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SGFA"],"prefix":"10.1145","author":[{"given":"Lukas","family":"Janik","sequence":"first","affiliation":[{"name":"Slovak University of Technology, Bratislava, Slovakia"}]},{"given":"Daniela","family":"Chuda","sequence":"additional","affiliation":[{"name":"Slovak University of Technology, Bratislava, Slovakia"}]},{"given":"Kamil","family":"Burda","sequence":"additional","affiliation":[{"name":"Slovak University of Technology, Bratislava, Slovakia"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206505.3206571"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3151848.3151878"},{"volume-title":"Biometric and traditional mobile authentication techniques: Overviews and open issues","author":"Amin Reham","key":"e_1_3_2_1_3_1","unstructured":"Reham Amin , Tarek Gaber , Ghada Eltaweel , and Aboul Ella Hassanien . 2015. Biometric and traditional mobile authentication techniques: Overviews and open issues . In Intelligent Systems Reference Library . Vol. 70 . 423--426. Reham Amin, Tarek Gaber, Ghada Eltaweel, and Aboul Ella Hassanien. 2015. Biometric and traditional mobile authentication techniques: Overviews and open issues. In Intelligent Systems Reference Library. Vol. 70. 423--426."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Julio Angulo and W Erik. 2012. Exploring Touch-screen Biometrics for User Identification on Smart Phones. In Privacy and Identity Management for Life. 130--143.  Julio Angulo and W Erik. 2012. Exploring Touch-screen Biometrics for User Identification on Smart Phones. In Privacy and Identity Management for Life. 130--143.","DOI":"10.1007\/978-3-642-31668-5_10"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053236"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983468.2983525"},{"key":"e_1_3_2_1_7_1","volume-title":"Biometric Properties of Mouse Interaction Features on the Web. Interacting with Computers 15","author":"Chuda Daniela","year":"2018","unstructured":"Daniela Chuda , Peter Kratky , and Kamil Burda . 2018. Biometric Properties of Mouse Interaction Features on the Web. Interacting with Computers 15 ( 2018 ). Daniela Chuda, Peter Kratky, and Kamil Burda. 2018. Biometric Properties of Mouse Interaction Features on the Web. Interacting with Computers 15 (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"User identity verification via mouse dynamics. Information Sciences 201 (oct","author":"Feher Clint","year":"2012","unstructured":"Clint Feher , Yuval Elovici , Robert Moskovitch , Lior Rokach , and Alon Schclar . 2012. User identity verification via mouse dynamics. Information Sciences 201 (oct 2012 ), 19--36. Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, and Alon Schclar. 2012. User identity verification via mouse dynamics. Information Sciences 201 (oct 2012), 19--36."},{"key":"e_1_3_2_1_9_1","volume-title":"Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. 8, 1","author":"Frank M.","year":"2013","unstructured":"M. Frank , R. Biedert , E. Ma , I. Martinovic , and D. Song . 2013 . Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. 8, 1 (2013), 136--148. M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. 2013. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. 8, 1 (2013), 136--148."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Hugo Gamboa and Ana Fred. 2004. A Behavioural Biometric System Based on Human Computer Interaction. (2004).  Hugo Gamboa and Ana Fred. 2004. A Behavioural Biometric System Based on Human Computer Interaction. (2004).","DOI":"10.1117\/12.542625"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079644"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-018-0500-0"},{"key":"e_1_3_2_1_13_1","volume-title":"Mouse Curve Biometrics. In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1--6.","author":"Schulz Douglas A.","year":"2006","unstructured":"Douglas A. Schulz . 2006 . Mouse Curve Biometrics. In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1--6. Douglas A. Schulz. 2006. Mouse Curve Biometrics. In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1--6."},{"key":"e_1_3_2_1_14_1","volume-title":"Andrew Beng Jin Teoh, and Shigang Yue","author":"Teh Pin Shen","year":"2013","unstructured":"Pin Shen Teh , Andrew Beng Jin Teoh, and Shigang Yue . 2013 . A survey of keystroke dynamics biometrics. The Scientific World Journal 11 (2013). Pin Shen Teh, Andrew Beng Jin Teoh, and Shigang Yue. 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal 11 (2013)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837126.2837127"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5120\/1842-2493"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_18_1","volume-title":"Ben Taylor, and Zheng Wang.","author":"Ye Guixin","year":"2017","unstructured":"Guixin Ye , Zhanyong Tang , Dingyi Fang , Xiaojiang Chen , Kwang In Kim , Ben Taylor, and Zheng Wang. 2017 . Cracking Android Pattern Lock in Five Attempts . (2017). Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, and Zheng Wang. 2017. Cracking Android Pattern Lock in Five Attempts. (2017)."}],"event":{"name":"CompSysTech '20: International Conference on Computer Systems and Technologies '20","sponsor":["UORB University of Ruse, Bulgaria"],"location":"Ruse Bulgaria","acronym":"CompSysTech '20"},"container-title":["Proceedings of the 21st International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407982.3408021","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407982.3408021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:58Z","timestamp":1750199938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407982.3408021"}},"subtitle":["A Two-Factor Smartphone Authentication Mechanism Using Touch Behavioral Biometrics"],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":18,"alternative-id":["10.1145\/3407982.3408021","10.1145\/3407982"],"URL":"https:\/\/doi.org\/10.1145\/3407982.3408021","relation":{},"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}