{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:25:59Z","timestamp":1768487159135,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3574190","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:18Z","timestamp":1681975878000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Introduction to Authentication using Behavioral Biometrics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6923-9066","authenticated-orcid":false,"given":"Jonathan","family":"Liebers","sequence":"first","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5671-1640","authenticated-orcid":false,"given":"Uwe","family":"Gruenefeld","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0013-715X","authenticated-orcid":false,"given":"Daniel","family":"Buschek","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bayreuth, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8354-2195","authenticated-orcid":false,"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"University of the Bundeswehr Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0132-4934","authenticated-orcid":false,"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531106"},{"key":"e_1_3_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3127459"},{"key":"e_1_3_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173829"},{"key":"e_1_3_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_3_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445528"},{"key":"e_1_3_3_1_8_1","doi-asserted-by":"publisher","unstructured":"Jonathan Liebers Sascha Brockel Uwe Gruenefeld and Stefan Schneegass. 2022. Identifying Users by Their Hand Tracking Data in Augmented and Virtual Reality. International Journal of Human\u2013Computer Interaction 0 0(2022) 1\u201316. https:\/\/doi.org\/10.1080\/10447318.2022.2120845 arXiv:https:\/\/doi.org\/10.1080\/10447318.2022.2120845","DOI":"10.1080\/10447318.2022.2120845"},{"key":"e_1_3_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489849.3489880"},{"key":"e_1_3_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472058"},{"key":"e_1_3_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3445022"},{"key":"e_1_3_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3445021"},{"key":"e_1_3_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-129-0.ch001"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3574190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3574190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:42Z","timestamp":1750178862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3574190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":14,"alternative-id":["10.1145\/3544549.3574190","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3574190","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}