{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T02:35:33Z","timestamp":1770345333983,"version":"3.49.0"},"reference-count":89,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"crossref","award":["NSF-CNS-1718116, 1718109, and NSF-CAREER-CNS-1453647"],"award-info":[{"award-number":["NSF-CNS-1718116, 1718109, and NSF-CAREER-CNS-1453647"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2021,11,30]]},"abstract":"<jats:p>\n            As many vulnerabilities of one-time authentication systems have already been uncovered, there is a growing need and trend to adopt\n            <jats:italic>continuous authentication<\/jats:italic>\n            systems. Biometrics provides an excellent means for periodic verification of the authenticated users without breaking the continuity of a session. Nevertheless, as attacks to computing systems increase, biometric systems demand more user information in their operations, yielding privacy issues for users in biometric-based continuous authentication systems. However, the current state-of-the-art privacy technologies are not viable or costly for the continuous authentication systems, which require periodic real-time verification. In this article, we introduce a novel, lightweight, &lt;underline&gt;p&lt;\/underline&gt;rivacy-&lt;underline&gt;a&lt;\/underline&gt;ware, and secure &lt;underline&gt;c&lt;\/underline&gt;ontinuous &lt;underline&gt;a&lt;\/underline&gt;uthentication protocol called PACA. PACA is initiated through a password-based key exchange (PAKE) mechanism, and it continuously authenticates users based on their biometrics in a privacy-aware manner. Then, we design an actual continuous user authentication system under the proposed protocol. In this concrete system, we utilize a privacy-aware template matching technique and a wearable-assisted keystroke dynamics-based continuous authentication method. This provides privacy guarantees without relying on any trusted third party while allowing the comparison of noisy user inputs (due to biometric data) and yielding an efficient and lightweight protocol. Finally, we implement our system on an Apple smartwatch and perform experiments with real user data to evaluate the accuracy and resource consumption of our concrete system.\n          <\/jats:p>","DOI":"10.1145\/3464690","type":"journal-article","created":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T10:52:54Z","timestamp":1630579974000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA"],"prefix":"10.1145","volume":"24","author":[{"given":"Abbas","family":"Acar","sequence":"first","affiliation":[{"name":"Florida International University, Miami, Florida"}]},{"given":"Shoukat","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, Alberta, Canada"}]},{"given":"Koray","family":"Karabina","sequence":"additional","affiliation":[{"name":"National Research Council Canada, Canada"}]},{"given":"Cengiz","family":"Kaygusuz","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, Florida"}]},{"given":"Hidayet","family":"Aksu","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, Florida"}]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, Florida"}]},{"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, Florida"}]}],"member":"320","published-online":{"date-parts":[[2021,9,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. https:\/\/www.zdnet.com\/article\/symantec-sacks-sta ff-for-issuing-unauthorized-google-certificates\/. Accessed: 2020-1-20.  [n.d.]. https:\/\/www.zdnet.com\/article\/symantec-sacks-sta ff-for-issuing-unauthorized-google-certificates\/. Accessed: 2020-1-20."},{"key":"e_1_2_1_2_1","unstructured":"[n.d.]. https:\/\/www.theverge.com\/2019\/3\/21\/18275837\/face book-plain-text-password-storage-hundreds-millions-users. Accessed: 2020-1-20.  [n.d.]. https:\/\/www.theverge.com\/2019\/3\/21\/18275837\/face book-plain-text-password-storage-hundreds-millions-users. Accessed: 2020-1-20."},{"key":"e_1_2_1_3_1","unstructured":"[n.d.]. https:\/\/scikit-learn.org\/stable\/modules\/generate d\/sklearn.feature_selection.chi2.html. Accessed: 2020-1-20.  [n.d.]. https:\/\/scikit-learn.org\/stable\/modules\/generate d\/sklearn.feature_selection.chi2.html. Accessed: 2020-1-20."},{"key":"e_1_2_1_4_1","unstructured":"[n.d.]. https:\/\/scikit-learn.org\/stable\/modules\/generate d\/sklearn.feature_selection.f_classif.html. Accessed: 2020-1-20.  [n.d.]. https:\/\/scikit-learn.org\/stable\/modules\/generate d\/sklearn.feature_selection.f_classif.html. Accessed: 2020-1-20."},{"key":"e_1_2_1_5_1","unstructured":"[n.d.]. KISS FFT. https:\/\/github.com\/mborgerding\/kissfft. Accessed: 2019-07-01.  [n.d.]. KISS FFT. https:\/\/github.com\/mborgerding\/kissfft. Accessed: 2019-07-01."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084304"},{"key":"e_1_2_1_7_1","volume-title":"IEEE Security and Privacy Workshops (SPW)","author":"Acar Abbas","year":"2018","unstructured":"Abbas Acar , Hidayet Aksu , Kemal Akkaya , and A. Selcuk Uluagac . 2018. WACA: Wearable-assisted continuous authentication . IEEE Security and Privacy Workshops (SPW) ( 2018 ). Abbas Acar, Hidayet Aksu, Kemal Akkaya, and A. Selcuk Uluagac. 2018. WACA: Wearable-assisted continuous authentication. IEEE Security and Privacy Workshops (SPW) (2018)."},{"key":"#cr-split#-e_1_2_1_8_1.1","doi-asserted-by":"crossref","unstructured":"A. Acar H. Aksu A. S. Uluagac and K. Akkaya. 2020. A usable and robust continuous authentication framework using wearables. IEEE Transactions on Mobile Computing (2020) 1-1. DOI:https:\/\/doi.org\/10.1109\/TMC.2020.2974941 10.1109\/TMC.2020.2974941","DOI":"10.1109\/TMC.2020.2974941"},{"key":"#cr-split#-e_1_2_1_8_1.2","doi-asserted-by":"crossref","unstructured":"A. Acar H. Aksu A. S. Uluagac and K. Akkaya. 2020. A usable and robust continuous authentication framework using wearables. IEEE Transactions on Mobile Computing (2020) 1-1. DOI:https:\/\/doi.org\/10.1109\/TMC.2020.2974941","DOI":"10.1109\/TMC.2020.2974941"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.88"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_18"},{"key":"e_1_2_1_12_1","unstructured":"Acceptto. [n.d.]. Your Employee and Customer Logins Have Already Been Hacked. https:\/\/www.acceptto.com\/.  Acceptto. [n.d.]. Your Employee and Customer Logins Have Already Been Hacked. https:\/\/www.acceptto.com\/."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789351"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3326302"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_21"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2977533"},{"key":"e_1_2_1_17_1","unstructured":"Kiran S. Balagani Paolo Gasti Aaron Elliott Azriel Richardson and Mike O\u2019Neal. [n.d.]. The impact of application context on privacy and performance of keystroke authentication systems. Journal of Computer SecurityPreprint ([n.\u00a0d.]) 1\u201314.  Kiran S. Balagani Paolo Gasti Aaron Elliott Azriel Richardson and Mike O\u2019Neal. [n.d.]. The impact of application context on privacy and performance of keystroke authentication systems. Journal of Computer SecurityPreprint ([n.\u00a0d.]) 1\u201314."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70500-0_3"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"e_1_2_1_21_1","first-page":"13","article-title":"Biometric authentication: A review. International Journal of u-and e-Service","volume":"2","author":"Bhattacharyya Debnath","year":"2009","unstructured":"Debnath Bhattacharyya , Rahul Ranjan , Farkhod Alisherov , and Minkyu Choi . 2009 . Biometric authentication: A review. International Journal of u-and e-Service , Science and Technology 2 , 3 (2009), 13 \u2013 28 . Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov, and Minkyu Choi. 2009. Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology 2, 3 (2009), 13\u201328.","journal-title":"Science and Technology"},{"key":"e_1_2_1_22_1","unstructured":"Blackberry. [n.d.]. BlackBerry Persona Adaptive Security and AI to Protect Mobile Endpoints.https:\/\/www.blackberry.com\/us\/en\/products\/blackb erry-persona#industry-focus.  Blackberry. [n.d.]. BlackBerry Persona Adaptive Security and AI to Protect Mobile Endpoints.https:\/\/www.blackberry.com\/us\/en\/products\/blackb erry-persona#industry-focus."},{"key":"e_1_2_1_24_1","volume-title":"International Conference on Security and Cryptography (SECRYPT\u201911)","author":"Blanton M.","year":"2011","unstructured":"M. Blanton and M. Aliasgari . 2011. On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting . In International Conference on Security and Cryptography (SECRYPT\u201911) ( 2011 ). M. Blanton and M. Aliasgari. 2011. On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting. In International Conference on Security and Cryptography (SECRYPT\u201911) (2011)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041240"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770231.1770242"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.016"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368568"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.04.005"},{"key":"e_1_2_1_31_1","first-page":"219","article-title":"Biometric authentication system","volume":"6","author":"Burger Paul M.","year":"2001","unstructured":"Paul M. Burger . 2001 . Biometric authentication system . US Patent 6 , 219 ,439. Paul M. Burger. 2001. Biometric authentication system. US Patent 6,219,439.","journal-title":"US Patent"},{"key":"e_1_2_1_32_1","unstructured":"Tom Cocagne. [n.d.]. Minimal C implementation of the Secure Remote Password protocol (version 6a). https:\/\/github.com\/cocagne\/csrp.  Tom Cocagne. [n.d.]. Minimal C implementation of the Secure Remote Password protocol (version 6a). https:\/\/github.com\/cocagne\/csrp."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_2_1_34_1","volume-title":"17th Conference Network and Distributed System Security Symposium (NDSS).","author":"Evans David","year":"2011","unstructured":"David Evans , Yan Huang , Jonathan Katz , and Lior Malka . 2011 . Efficient privacy-preserving biometric identification . In 17th Conference Network and Distributed System Security Symposium (NDSS). David Evans, Yan Huang, Jonathan Katz, and Lior Malka. 2011. Efficient privacy-preserving biometric identification. In 17th Conference Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0124"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2014.6951539"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.03.003"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_2_1_39_1","unstructured":"Gatekeeper. [n.d.]. Continuous Authentication. https:\/\/gkaccess.com\/support\/glossary\/continuous-authentication\/.  Gatekeeper. [n.d.]. Continuous Authentication. https:\/\/gkaccess.com\/support\/glossary\/continuous-authentication\/."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITM.2012.044062"},{"key":"e_1_2_1_41_1","volume-title":"2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1\u20138.","author":"Govindarajan Sathya","unstructured":"Sathya Govindarajan , Paolo Gasti , and Kiran S. Balagani . 2013. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data . In 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1\u20138. Sathya Govindarajan, Paolo Gasti, and Kiran S. Balagani. 2013. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. In 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1\u20138."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"e_1_2_1_43_1","volume-title":"FLINT: Fast Library for Number Theory. Version 2.4.0","author":"Hart W.","year":"2013","unstructured":"W. Hart , F. Johansson , and S. Pancratz . 2013 . FLINT: Fast Library for Number Theory. Version 2.4.0 , http:\/\/flintlib.org. W. Hart, F. Johansson, and S. Pancratz. 2013. FLINT: Fast Library for Number Theory. Version 2.4.0, http:\/\/flintlib.org."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2793731.2794030"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206646"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.05.016"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.10.025"},{"key":"e_1_2_1_51_1","first-page":"9","article-title":"Sample estimate of the entropy of a random vector","volume":"23","author":"Kozachenko L. F.","year":"1987","unstructured":"L. F. Kozachenko and Nikolai N. Leonenko . 1987 . Sample estimate of the entropy of a random vector . Problemy Peredachi Informatsii 23 , 2 (1987), 9 \u2013 16 . L. F. Kozachenko and Nikolai N. Leonenko. 1987. Sample estimate of the entropy of a random vector. Problemy Peredachi Informatsii 23, 2 (1987), 9\u201316.","journal-title":"Problemy Peredachi Informatsii"},{"key":"e_1_2_1_52_1","unstructured":"H. Krawczyk. [n.d.]. The OPAQUE Asymmetric PAKE Protocol draft-krawczyk-cfrg-opaque-00. https:\/\/tools.ietf.org\/html\/draft-krawczyk-cfrg-opaque-00.  H. Krawczyk. [n.d.]. The OPAQUE Asymmetric PAKE Protocol draft-krawczyk-cfrg-opaque-00. https:\/\/tools.ietf.org\/html\/draft-krawczyk-cfrg-opaque-00."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_33"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854244"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2010.5514648"},{"key":"e_1_2_1_56_1","volume-title":"2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 309\u2013320","author":"Lee Wei-Han","unstructured":"Wei-Han Lee and Ruby B. Lee . 2017. Sensor-based implicit authentication of smartphone users . In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 309\u2013320 . Wei-Han Lee and Ruby B. Lee. 2017. Sensor-based implicit authentication of smartphone users. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 309\u2013320."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849285"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of SPIE, Electronic Imaging, Media Forensics and Security II 7541","author":"Nagar A.","year":"2010","unstructured":"A. Nagar , K. Nandakumar , and A. Jain . 2010. Biometric template transformation: A security analysis . In Proceedings of SPIE, Electronic Imaging, Media Forensics and Security II 7541 ( 2010 ), 1\u201315. Invited paper. A. Nagar, K. Nandakumar, and A. Jain. 2010. Biometric template transformation: A security analysis. In Proceedings of SPIE, Electronic Imaging, Media Forensics and Security II 7541 (2010), 1\u201315. Invited paper."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2391659.2391765"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2535120"},{"key":"e_1_2_1_62_1","volume-title":"Privacy-preserving biometric authentication: Challenges and directions. Security and Communication Networks 2017","author":"Pagnin Elena","year":"2017","unstructured":"Elena Pagnin and Aikaterini Mitrokotsa . 2017. Privacy-preserving biometric authentication: Challenges and directions. Security and Communication Networks 2017 ( 2017 ). Elena Pagnin and Aikaterini Mitrokotsa. 2017. Privacy-preserving biometric authentication: Challenges and directions. Security and Communication Networks 2017 (2017)."},{"key":"e_1_2_1_63_1","unstructured":"Plurilock. [n.d.]. GLOSSARY TERM Continuous Authentication. https:\/\/www.plurilock.com\/products\/adapt\/.  Plurilock. [n.d.]. GLOSSARY TERM Continuous Authentication. https:\/\/www.plurilock.com\/products\/adapt\/."},{"key":"e_1_2_1_64_1","unstructured":"Plurilock. [n.d.]. Plurilock Successfully Meets Second Milestone in Department of Homeland Security Contract. https:\/\/www.plurilock.com\/press-release\/pluriloc k-successfully-meets-second-milestone-in-department-of-homeland-security-contract\/.  Plurilock. [n.d.]. Plurilock Successfully Meets Second Milestone in Department of Homeland Security Contract. https:\/\/www.plurilock.com\/press-release\/pluriloc k-successfully-meets-second-milestone-in-department-of-homeland-security-contract\/."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0049"},{"key":"e_1_2_1_68_1","first-page":"1","article-title":"Unlinkable improved multi-biometric iris fuzzy vault","volume":"26","author":"Rathgeb C.","year":"2016","unstructured":"C. Rathgeb , B. Tams , J. Wagner , and C. Busch . 2016 . Unlinkable improved multi-biometric iris fuzzy vault . EURASIP Journal on Information Security 26 (2016), 1 \u2013 16 . C. Rathgeb, B. Tams, J. Wagner, and C. Busch. 2016. Unlinkable improved multi-biometric iris fuzzy vault. EURASIP Journal on Information Security 26 (2016), 1\u201316.","journal-title":"EURASIP Journal on Information Security"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.698"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0001"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401919"},{"key":"e_1_2_1_73_1","volume-title":"Shahandashti","author":"Safa Nashad Ahmed","year":"2014","unstructured":"Nashad Ahmed Safa , Reihaneh Safavi-Naini , and Siamak F . Shahandashti . 2014 . Privacy-preserving implicit authentication. In IFIP International Information Security Conference. Springer , 471\u2013484. Nashad Ahmed Safa, Reihaneh Safavi-Naini, and Siamak F. Shahandashti. 2014. Privacy-preserving implicit authentication. In IFIP International Information Security Conference. Springer, 471\u2013484."},{"key":"e_1_2_1_74_1","volume-title":"Biometrics Symposium","author":"Scheirer W.","year":"2007","unstructured":"W. Scheirer and T. Boult . 2007. Cracking fuzzy vaults and biometric encryption . In Biometrics Symposium ( 2007 ), 1\u20136. W. Scheirer and T. Boult. 2007. Cracking fuzzy vaults and biometric encryption. In Biometrics Symposium (2007), 1\u20136."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2375571"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.009"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251352"},{"key":"e_1_2_1_79_1","volume-title":"Biometric authentication methods on smartphones: A survey.PsychNology Journal 14, 2","author":"Spolaor Riccardo","year":"2016","unstructured":"Riccardo Spolaor , QianQian Li , Merylin Monaro , Mauro Conti , Luciano Gamberini , and Giuseppe Sartori . 2016. Biometric authentication methods on smartphones: A survey.PsychNology Journal 14, 2 ( 2016 ). Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, and Giuseppe Sartori. 2016. Biometric authentication methods on smartphones: A survey.PsychNology Journal 14, 2 (2016)."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.001"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.849028"},{"key":"e_1_2_1_82_1","unstructured":"B. Tams. 2014. Decodability attack against the fuzzy commitment scheme with public feature transforms. arxiv.org\/abs\/1406.1154.pdf.  B. Tams. 2014. Decodability attack against the fuzzy commitment scheme with public feature transforms. arxiv.org\/abs\/1406.1154.pdf."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2392559"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings o the Annual Network and Distributed System Security Symposium 20th NDSS 2013, 24-27 February. 1\u201316","author":"Tey Chee Meng","year":"2013","unstructured":"Chee Meng Tey , Payas Gupta , and Debin Gao . 2013 . I can be you: Questioning the use of keystroke dynamics as biometrics . In Proceedings o the Annual Network and Distributed System Security Symposium 20th NDSS 2013, 24-27 February. 1\u201316 . Chee Meng Tey, Payas Gupta, and Debin Gao. 2013. I can be you: Questioning the use of keystroke dynamics as biometrics. In Proceedings o the Annual Network and Distributed System Security Symposium 20th NDSS 2013, 24-27 February. 1\u201316."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210215"},{"key":"e_1_2_1_87_1","unstructured":"Tom Wu. [n.d.]. The Stanford SRP Homepage. http:\/\/srp.stanford.edu\/.  Tom Wu. [n.d.]. The Stanford SRP Homepage. http:\/\/srp.stanford.edu\/."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40588-4_5"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855770"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:11Z","timestamp":1750191431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"references-count":89,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,11,30]]}},"alternative-id":["10.1145\/3464690"],"URL":"https:\/\/doi.org\/10.1145\/3464690","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,2]]},"assertion":[{"value":"2020-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}