{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:29:34Z","timestamp":1759091374613,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,28]]},"DOI":"10.1145\/3445969.3450424","type":"proceedings-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:56:30Z","timestamp":1619344590000},"page":"88-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Matrix for Systematic Selection of Authentication Mechanisms in Challenging Healthcare related Environments"],"prefix":"10.1145","author":[{"given":"Michael","family":"Grabatin","sequence":"first","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"}]},{"given":"Michael","family":"Steinke","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"}]},{"given":"Daniela","family":"P\u00f6hn","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"}]},{"given":"Wolfgang","family":"Hommel","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7120436"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS48893.2020.9096825"},{"key":"e_1_3_2_2_3_1","volume-title":"Biometric Authentication Systems: Security Concerns and Solutions. In 2018 3rd International Conference for Convergence in Technology (I2CT). 1--6.","author":"Bhartiya Namrata","year":"2018","unstructured":"Namrata Bhartiya , Namrata Jangid , and Sheetal Jannu . 2018 . Biometric Authentication Systems: Security Concerns and Solutions. In 2018 3rd International Conference for Convergence in Technology (I2CT). 1--6. Namrata Bhartiya, Namrata Jangid, and Sheetal Jannu. 2018. Biometric Authentication Systems: Security Concerns and Solutions. In 2018 3rd International Conference for Convergence in Technology (I2CT). 1--6."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052989"},{"key":"e_1_3_2_2_5_1","volume-title":"SysPal: System-Guided Pattern Locks for Android. In 2017 IEEE Symposium on Security and Privacy (SP). 338--356","author":"Cho Geumhwan","year":"2017","unstructured":"Geumhwan Cho , Jun Ho Huh , Junsung Cho , Seongyeol Oh , Youngbae Song , and Hyoungshick Kim . 2017 . SysPal: System-Guided Pattern Locks for Android. In 2017 IEEE Symposium on Security and Privacy (SP). 338--356 . Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, and Hyoungshick Kim. 2017. SysPal: System-Guided Pattern Locks for Android. In 2017 IEEE Symposium on Security and Privacy (SP). 338--356."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2753464"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.112101619"},{"key":"e_1_3_2_2_8_1","unstructured":"Fr\u00e9d\u00e9ric Ehrler Katherine S Blondon Dominique Baillon-Bigotte and Christian Lovis. 2017. Smartphones to Access to Patient Data in Hospital Settings: Authentication Solutions for Shared Devices. In pHealth. 73--78.  Fr\u00e9d\u00e9ric Ehrler Katherine S Blondon Dominique Baillon-Bigotte and Christian Lovis. 2017. Smartphones to Access to Patient Data in Hospital Settings: Authentication Solutions for Shared Devices. In pHealth. 73--78."},{"key":"e_1_3_2_2_9_1","volume-title":"2016 International Conference on Audio, Language and Image Processing (ICALIP). 106--110","author":"Yangyang Sha","year":"2016","unstructured":"Yangyang Sha et. al. 2016 . The design of Access Control System based on dynamic audio token . In 2016 International Conference on Audio, Language and Image Processing (ICALIP). 106--110 . Yangyang Sha et. al. 2016. The design of Access Control System based on dynamic audio token. In 2016 International Conference on Audio, Language and Image Processing (ICALIP). 106--110."},{"key":"e_1_3_2_2_10_1","volume-title":"Kim-Kwang Raymond Choo, and Bin Xiao","author":"Gai Keke","year":"2020","unstructured":"Keke Gai , Yulu Wu , Liehuang Zhu , Kim-Kwang Raymond Choo, and Bin Xiao . 2020 . Blockchain-Enabled Trustworthy Group Communications in UAV Networks. IEEE Transactions on Intelligent Transportation Systems (2020), 1--13. Keke Gai, Yulu Wu, Liehuang Zhu, Kim-Kwang Raymond Choo, and Bin Xiao. 2020. Blockchain-Enabled Trustworthy Group Communications in UAV Networks. IEEE Transactions on Intelligent Transportation Systems (2020), 1--13."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.6"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2019.8777471"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBAKE.2017.8090618"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280714"},{"key":"e_1_3_2_2_15_1","volume-title":"Disabilities and Authentication Methods: Usability and Security. In 2012 Seventh International Conference on Availability, Reliability and Security. 327--334","author":"Helkala Kirsi","year":"2012","unstructured":"Kirsi Helkala . 2012 . Disabilities and Authentication Methods: Usability and Security. In 2012 Seventh International Conference on Availability, Reliability and Security. 327--334 . Kirsi Helkala. 2012. Disabilities and Authentication Methods: Usability and Security. In 2012 Seventh International Conference on Availability, Reliability and Security. 327--334."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEE47123.2019.9014704"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173738"},{"volume-title":"Guide to Computer Network Security","author":"Kizza Joseph Migga","key":"e_1_3_2_2_18_1","unstructured":"Joseph Migga Kizza . 2017. Authentication . In Guide to Computer Network Security , Joseph Migga Kizza (Ed.). Springer International Publishing , Cham , 207--225. https:\/\/doi.org\/10.1007\/978--3--319--55606--2_10 Joseph Migga Kizza. 2017. Authentication. In Guide to Computer Network Security, Joseph Migga Kizza (Ed.). Springer International Publishing, Cham, 207--225. https:\/\/doi.org\/10.1007\/978--3--319--55606--2_10"},{"key":"e_1_3_2_2_19_1","volume-title":"Applications and Technology (LISAT) Conference","author":"Kowtko Marc Alexander","year":"2014","unstructured":"Marc Alexander Kowtko . 2014 . Biometric authentication for older adults. In IEEE Long Island Systems , Applications and Technology (LISAT) Conference 2014. 1--6. Marc Alexander Kowtko. 2014. Biometric authentication for older adults. In IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014. 1--6."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Pramod Kumar and Manmohan Singh Rauthan. 2016. Remote User Authentication Scheme: A Comparative Analysis and Improved Behavioral Biometrics Based Authentication Scheme. In 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 311--313.  Pramod Kumar and Manmohan Singh Rauthan. 2016. Remote User Authentication Scheme: A Comparative Analysis and Improved Behavioral Biometrics Based Authentication Scheme. In 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 311--313.","DOI":"10.1109\/ICMETE.2016.124"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516540.2516567"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MELECON48756.2020.9140544"},{"key":"e_1_3_2_2_23_1","volume-title":"Modeling Thermal Sequence Signal Decreasing for Dual Modal Password Breaking. In 2018 25th IEEE International Conference on Image Processing (ICIP). 1703--1707","author":"Li Duo","year":"2018","unstructured":"Duo Li and Xiao-Ping Zhang et. al. 2018 . Modeling Thermal Sequence Signal Decreasing for Dual Modal Password Breaking. In 2018 25th IEEE International Conference on Image Processing (ICIP). 1703--1707 . Duo Li and Xiao-Ping Zhang et. al. 2018. Modeling Thermal Sequence Signal Decreasing for Dual Modal Password Breaking. In 2018 25th IEEE International Conference on Image Processing (ICIP). 1703--1707."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359997.3365704"},{"volume-title":"Proceedings of the 14th International Conference on Availability, Reliability and Security","author":"Mainali Pradip","key":"e_1_3_2_2_25_1","unstructured":"Pradip Mainali , Carlton Shepherd , and Fabien A. P. Petitcolas . 2019. Privacy-Enhancing Context Authentication from Location-Sensitive Data . In Proceedings of the 14th International Conference on Availability, Reliability and Security ( Canterbury, CA, United Kingdom) (ARES 19). Association for Computing Machinery, New York, NY, USA, Article 87, 10 pages. https:\/\/doi.org\/10.1145\/3339252.3340334 Pradip Mainali, Carlton Shepherd, and Fabien A. P. Petitcolas. 2019. Privacy-Enhancing Context Authentication from Location-Sensitive Data. In Proceedings of the 14th International Conference on Availability, Reliability and Security (Canterbury, CA, United Kingdom) (ARES 19). Association for Computing Machinery, New York, NY, USA, Article 87, 10 pages. https:\/\/doi.org\/10.1145\/3339252.3340334"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANZCC47194.2019.8945589"},{"volume-title":"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. In IEEE Symposium on Security and Privacy (SP '20)","author":"Markert Philipp","key":"e_1_3_2_2_27_1","unstructured":"Philipp Markert , Daniel V. Bailey , Maximilian Golla , Markus D\u00fcrmuth , and Adam J. Aviv . 2020 . This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. In IEEE Symposium on Security and Privacy (SP '20) . IEEE, San Francisco, California, USA, 1525--1542. Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus D\u00fcrmuth, and Adam J. Aviv. 2020. This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. In IEEE Symposium on Security and Privacy (SP '20). IEEE, San Francisco, California, USA, 1525--1542."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386915"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/784589.784643"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_2_2_31_1","first-page":"439","article-title":"A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication","volume":"19","author":"Raza Mudassar","year":"2012","unstructured":"Mudassar Raza , Muhammad Iqbal , Muhammad Sharif , and Waqas Haider . 2012 . A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication . World Applied Sciences Journal , Vol. 19 , 4 (2012), 439 -- 444 . Mudassar Raza, Muhammad Iqbal, Muhammad Sharif, and Waqas Haider. 2012. A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication. World Applied Sciences Journal, Vol. 19, 4 (2012), 439--444.","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741683"},{"volume-title":"Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare","author":"Saleem Kashif","key":"e_1_3_2_2_33_1","unstructured":"Kashif Saleem , Zhiyuan Tan , and William Buchanan . 2017. Security for Cyber -Physical Systems in Healthcare . In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare , Christoph Thuemmler and Chunxue Bai (Eds.). Springer International Publishing , Cham , 233--251. https:\/\/doi.org\/10.1007\/978--3--319--47617--9_12 Kashif Saleem, Zhiyuan Tan, and William Buchanan. 2017. Security for Cyber -Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, Christoph Thuemmler and Chunxue Bai (Eds.). Springer International Publishing, Cham, 233--251. https:\/\/doi.org\/10.1007\/978--3--319--47617--9_12"},{"key":"e_1_3_2_2_34_1","first-page":"232","article-title":"Literature Survey on Automated Person Identification Techniques","volume":"2","author":"Sebastian Sruthy","year":"2013","unstructured":"Sruthy Sebastian . 2013 . Literature Survey on Automated Person Identification Techniques . International Journal of Computer Science and Mobile Computing - IJCSMC , Vol. 2 , 5 (2013), 232 -- 237 . Sruthy Sebastian. 2013. Literature Survey on Automated Person Identification Techniques. International Journal of Computer Science and Mobile Computing - IJCSMC, Vol. 2, 5 (2013), 232--237.","journal-title":"International Journal of Computer Science and Mobile Computing - IJCSMC"},{"key":"e_1_3_2_2_35_1","first-page":"2","article-title":"Biometric Authentication Methods on Smartphones: A Survey","volume":"14","author":"Spolaor Riccardo","year":"2016","unstructured":"Riccardo Spolaor , QianQian Li , Merylin Monaro , Mauro Conti , Luciano Gamberini , and Giuseppe Sartori . 2016 . Biometric Authentication Methods on Smartphones: A Survey . PsychNology Journal , Vol. 14 , 2 (Dec. 2016), 87--98. Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, and Giuseppe Sartori. 2016. Biometric Authentication Methods on Smartphones: A Survey. PsychNology Journal, Vol. 14, 2 (Dec. 2016), 87--98.","journal-title":"PsychNology Journal"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.05.005"},{"key":"e_1_3_2_2_37_1","first-page":"472","volume-title":"Graphical Passwords: A Survey. In 21st Annual Computer Security Applications Conference (ACSAC 05)","author":"Suo Xiaoyuan","unstructured":"Xiaoyuan Suo , Ying Zhu , and G.S. Owen . 2005 . Graphical Passwords: A Survey. In 21st Annual Computer Security Applications Conference (ACSAC 05) . 10 pp.-- 472 . https:\/\/doi.org\/10.1109\/CSAC.2005.27 Xiaoyuan Suo, Ying Zhu, and G.S. Owen. 2005. Graphical Passwords: A Survey. In 21st Annual Computer Security Applications Conference (ACSAC 05). 10 pp.--472. https:\/\/doi.org\/10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2934867"},{"key":"e_1_3_2_2_39_1","volume-title":"RFID Based Secure Mobile Communication Framework for Emergency Response Management. In 2010 IEEE Wireless Communication and Networking Conference. 1--6.","author":"Tran Thang","year":"2010","unstructured":"Thang Tran , Faqir Zarrar Yousaf , and Christian Wietfeld . 2010 . RFID Based Secure Mobile Communication Framework for Emergency Response Management. In 2010 IEEE Wireless Communication and Networking Conference. 1--6. Thang Tran, Faqir Zarrar Yousaf, and Christian Wietfeld. 2010. RFID Based Secure Mobile Communication Framework for Emergency Response Management. In 2010 IEEE Wireless Communication and Networking Conference. 1--6."},{"key":"e_1_3_2_2_40_1","first-page":"06","article-title":"The Care Cycle","volume":"51","author":"Verbeek X. A. A. M.","year":"2007","unstructured":"X. A. A. M. Verbeek and W. P. Lord . 2007 . The Care Cycle : An Overview. Medicamundi , Vol. 51 , 1 (2007), 06 . X. A. A. M. Verbeek and W. P. Lord. 2007. The Care Cycle: An Overview. Medicamundi, Vol. 51, 1 (2007), 06.","journal-title":"An Overview. Medicamundi"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2018.00020"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445969.3450424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445969.3450424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:24Z","timestamp":1750197804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445969.3450424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":41,"alternative-id":["10.1145\/3445969.3450424","10.1145\/3445969"],"URL":"https:\/\/doi.org\/10.1145\/3445969.3450424","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}