{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:09Z","timestamp":1750220169924,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,27]],"date-time":"2022-11-27T00:00:00Z","timestamp":1669507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["426052422"],"award-info":[{"award-number":["426052422"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,27]]},"DOI":"10.1145\/3568444.3570595","type":"proceedings-article","created":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T15:42:17Z","timestamp":1672328537000},"page":"270-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Single-Sign-On in Smart Homes using Continuous Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6923-9066","authenticated-orcid":false,"given":"Jonathan","family":"Liebers","sequence":"first","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4352-1012","authenticated-orcid":false,"given":"Nick","family":"Wittig","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4083-9399","authenticated-orcid":false,"given":"Simon","family":"Janzon","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6591-2276","authenticated-orcid":false,"given":"Pedram","family":"Golkar","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7133-1315","authenticated-orcid":false,"given":"Hakeem","family":"Moruf","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4304-4495","authenticated-orcid":false,"given":"Wilfried Forentin","family":"Wakeu Kontchipo","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5671-1640","authenticated-orcid":false,"given":"Uwe","family":"Gruenefeld","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0132-4934","authenticated-orcid":false,"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"HCI Group, University of Duisburg-Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/s00779-005-0347-6"},{"unstructured":"G. Bradski. 2000. The OpenCV Library. Dr. Dobb\u2019s Journal: Software Tools for the Professional Programmer 25 11(2000) 120\u2013123.  G. Bradski. 2000. The OpenCV Library. Dr. Dobb\u2019s Journal: Software Tools for the Professional Programmer 25 11(2000) 120\u2013123.","key":"e_1_3_2_1_2_1"},{"volume-title":"The 3rd Annual Global Password Security Report. https:\/\/lp-cdn.lastpass.com\/lporcamedia\/document-library\/lastpass\/pdf\/en\/LMI0828a-IAM-LastPass-State-of-the-Password-Report.pdf","author":"LogMeIn LastPass","unstructured":"LastPass by LogMeIn . 2019. The 3rd Annual Global Password Security Report. https:\/\/lp-cdn.lastpass.com\/lporcamedia\/document-library\/lastpass\/pdf\/en\/LMI0828a-IAM-LastPass-State-of-the-Password-Report.pdf LastPass by LogMeIn. 2019. The 3rd Annual Global Password Security Report. https:\/\/lp-cdn.lastpass.com\/lporcamedia\/document-library\/lastpass\/pdf\/en\/LMI0828a-IAM-LastPass-State-of-the-Password-Report.pdf","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2594368.2594369"},{"key":"e_1_3_2_1_5_1","volume-title":"3rd USENIX Workshop on Health Security and Privacy (HealthSec 12)","author":"Cornelius Cory","year":"2012","unstructured":"Cory Cornelius , Jacob Sorber , Ronald Peterson , Joe Skinner , Ryan Halter , and David Kotz . 2012 . Who Wears Me? Bioimpedance as a Passive Biometric . In 3rd USENIX Workshop on Health Security and Privacy (HealthSec 12) . USENIX Association, Bellevue, WA. https:\/\/www.usenix.org\/conference\/healthsec12\/workshop-program\/presentation\/Cornelius Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, and David Kotz. 2012. Who Wears Me? Bioimpedance as a Passive Biometric. In 3rd USENIX Workshop on Health Security and Privacy (HealthSec 12). USENIX Association, Bellevue, WA. https:\/\/www.usenix.org\/conference\/healthsec12\/workshop-program\/presentation\/Cornelius"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/IIHMSP.2010.83"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/978-981-13-1135-2_42"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/3411764.3445528"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/3334480.3383059"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3282894.3282923"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-540-74048-3_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3007120.3007164"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ICCV.1998.710772"},{"volume-title":"A Taxonomy of Single Sign-On Systems","author":"Pashalidis Andreas","unstructured":"Andreas Pashalidis and Chris\u00a0 J. Mitchell . 2003. A Taxonomy of Single Sign-On Systems . In Information Security and Privacy, Rei Safavi-Naini and Jennifer Seberry (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 249\u2013264. Andreas Pashalidis and Chris\u00a0J. Mitchell. 2003. A Taxonomy of Single Sign-On Systems. In Information Security and Privacy, Rei Safavi-Naini and Jennifer Seberry (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 249\u2013264.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Global Smart Home Market to Exceed $ 53.45 Billion by","author":"Research Zion\u00a0Market","year":"2022","unstructured":"Zion\u00a0Market Research . 2018. Global Smart Home Market to Exceed $ 53.45 Billion by 2022 . https:\/\/www.globenewswire.com\/news-release\/2018\/01\/03\/1281338\/0\/en\/Global-Smart-Home-Market-to-Exceed-53-45-Billion-by-2022-Zion-Market-Research.html Zion\u00a0Market Research. 2018. Global Smart Home Market to Exceed $ 53.45 Billion by 2022. https:\/\/www.globenewswire.com\/news-release\/2018\/01\/03\/1281338\/0\/en\/Global-Smart-Home-Market-to-Exceed-53-45-Billion-by-2022-Zion-Market-Research.html"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ICISCE.2015.177"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ACV.1994.341300"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.eswa.2014.08.052"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/1497185.1497223"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.4018\/978-1-61350-129-0.ch001"},{"volume-title":"Activity Recognition in Pervasive Intelligent Environments","author":"Wang Liang","unstructured":"Liang Wang , Tao Gu , Xianping Tao , Hanhua Chen , and Jian Lu. 2011. Multi-user activity recognition in a smart home . In Activity Recognition in Pervasive Intelligent Environments . Springer , 59\u201381. Liang Wang, Tao Gu, Xianping Tao, Hanhua Chen, and Jian Lu. 2011. Multi-user activity recognition in a smart home. In Activity Recognition in Pervasive Intelligent Environments. Springer, 59\u201381.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1038\/scientificamerican0991-94"}],"event":{"acronym":"MUM 2022","name":"MUM 2022: 21th International Conference on Mobile and Ubiquitous Multimedia","location":"Lisbon Portugal"},"container-title":["Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568444.3570595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568444.3570595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:39Z","timestamp":1750186839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568444.3570595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,27]]},"references-count":22,"alternative-id":["10.1145\/3568444.3570595","10.1145\/3568444"],"URL":"https:\/\/doi.org\/10.1145\/3568444.3570595","relation":{},"subject":[],"published":{"date-parts":[[2022,11,27]]},"assertion":[{"value":"2022-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}