{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:00Z","timestamp":1750220460541,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,4]]},"DOI":"10.1145\/3433174.3433600","type":"proceedings-article","created":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T00:48:26Z","timestamp":1612226906000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels"],"prefix":"10.1145","author":[{"given":"Jonathan Francis","family":"Roscoe","sequence":"first","affiliation":[{"name":"BT Applied Research"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Max","family":"Smith-Creasey","sequence":"additional","affiliation":[{"name":"BT Applied Research"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations. In 18th Annual IEEE International Conference on Intelligence and Security Informatics.","author":"Andrade Tiago\u00a0Martins","year":"2020","unstructured":"Tiago\u00a0Martins Andrade , Max Smith-Creasey , and Jonathan\u00a0Francis Roscoe . 2020 . Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations. In 18th Annual IEEE International Conference on Intelligence and Security Informatics. Tiago\u00a0Martins Andrade, Max Smith-Creasey, and Jonathan\u00a0Francis Roscoe. 2020. Discerning User Activity in Extended Reality Through Side-Channel Accelerometer Observations. In 18th Annual IEEE International Conference on Intelligence and Security Informatics."},{"key":"e_1_3_2_1_2_1","volume-title":"Image understanding for iris biometrics: A survey. Computer vision and image understanding 110, 2","author":"Bowyer W","year":"2008","unstructured":"Kevin\u00a0 W Bowyer , Karen Hollingsworth , and Patrick\u00a0 J Flynn . 2008. Image understanding for iris biometrics: A survey. Computer vision and image understanding 110, 2 ( 2008 ), 281\u2013307. Kevin\u00a0W Bowyer, Karen Hollingsworth, and Patrick\u00a0J Flynn. 2008. Image understanding for iris biometrics: A survey. Computer vision and image understanding 110, 2 (2008), 281\u2013307."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0635-7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_1_5_1","unstructured":"Sanorita Dey Nirupam Roy Wenyuan Xu Romit\u00a0Roy Choudhury and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.. In NDSS. Citeseer.  Sanorita Dey Nirupam Roy Wenyuan Xu Romit\u00a0Roy Choudhury and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.. In NDSS. Citeseer."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1123\/jpah.2.3.366"},{"key":"e_1_3_2_1_7_1","volume-title":"Biometric Gait Authentication Using Accelerometer Sensor.JCP 1, 7","author":"Gafurov Davrondzhon","year":"2006","unstructured":"Davrondzhon Gafurov , Kirsi Helkala , and Torkjel S\u00f8ndrol . 2006. Biometric Gait Authentication Using Accelerometer Sensor.JCP 1, 7 ( 2006 ), 51\u201359. Davrondzhon Gafurov, Kirsi Helkala, and Torkjel S\u00f8ndrol. 2006. Biometric Gait Authentication Using Accelerometer Sensor.JCP 1, 7 (2006), 51\u201359."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.22260\/ISARC2017\/0011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702518"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029632.1029681"},{"volume-title":"Introduction to biometrics","author":"Jain K","key":"e_1_3_2_1_11_1","unstructured":"Anil\u00a0 K Jain , Arun\u00a0 A Ross , and Karthik Nandakumar . 2011. Introduction to biometrics . Springer Science & Business Media . Anil\u00a0K Jain, Arun\u00a0A Ross, and Karthik Nandakumar. 2011. Introduction to biometrics. Springer Science & Business Media."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897824.2925953"},{"key":"e_1_3_2_1_14_1","volume-title":"Moodscope: Building a mood sensor from smartphone usage patterns. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. 389\u2013402.","author":"Likamwa Robert","year":"2013","unstructured":"Robert Likamwa , Yunxin Liu , Nicholas\u00a0 D Lane , and Lin Zhong . 2013 . Moodscope: Building a mood sensor from smartphone usage patterns. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. 389\u2013402. Robert Likamwa, Yunxin Liu, Nicholas\u00a0D Lane, and Lin Zhong. 2013. Moodscope: Building a mood sensor from smartphone usage patterns. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. 389\u2013402."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00694"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/s91209572"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91262-2_64"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138864"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-020-1530-z"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2016.0092"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987390"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/jsid.891"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2013.6486856"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145312"},{"key":"e_1_3_2_1_26_1","volume-title":"We can hear you with Wi-Fi!IEEE Transactions on Mobile Computing 15, 11","author":"Wang Guanhua","year":"2016","unstructured":"Guanhua Wang , Yongpan Zou , Zimu Zhou , Kaishun Wu , and Lionel\u00a0 M Ni. 2016. We can hear you with Wi-Fi!IEEE Transactions on Mobile Computing 15, 11 ( 2016 ), 2907\u20132920. Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, and Lionel\u00a0M Ni. 2016. We can hear you with Wi-Fi!IEEE Transactions on Mobile Computing 15, 11 (2016), 2907\u20132920."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Cheng Yang Ukadike\u00a0C Ugbolue Andrew Kerr Vladimir Stankovic Lina Stankovic Bruce Carse Konstantinos\u00a0T Kaliarntas and Philip\u00a0J Rowe. 2016. Autonomous gait event detection with portable single-camera gait kinematics analysis system. Journal of Sensors 2016(2016).  Cheng Yang Ukadike\u00a0C Ugbolue Andrew Kerr Vladimir Stankovic Lina Stankovic Bruce Carse Konstantinos\u00a0T Kaliarntas and Philip\u00a0J Rowe. 2016. Autonomous gait event detection with portable single-camera gait kinematics analysis system. Journal of Sensors 2016(2016).","DOI":"10.1155\/2016\/5036857"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/55.553063"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17020358"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00768"}],"event":{"name":"SIN 2020: 13th International Conference on Security of Information and Networks","acronym":"SIN 2020","location":"Merkez Turkey"},"container-title":["13th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433174.3433600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433174.3433600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433174.3433600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":30,"alternative-id":["10.1145\/3433174.3433600","10.1145\/3433174"],"URL":"https:\/\/doi.org\/10.1145\/3433174.3433600","relation":{},"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"2021-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}