{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T19:07:09Z","timestamp":1772305629528,"version":"3.50.1"},"reference-count":10,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Korean government","award":["2015-0-00168"],"award-info":[{"award-number":["2015-0-00168"]}]},{"name":"Korean government","award":["2016-0-00097"],"award-info":[{"award-number":["2016-0-00097"]}]},{"name":"Korean government","award":["2015-0-00168"],"award-info":[{"award-number":["2015-0-00168"]}]},{"name":"Korean government","award":["2016-0-00097"],"award-info":[{"award-number":["2016-0-00097"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>Personal Identification Numbers (PINs) and pattern drawing have been used as common authentication methods especially on smartphones. Such methods, however, are very vulnerable to the shoulder surfing attack. Thus, keystroke dynamics that authenticate legitimate users based on their typing manner have been studied for years. However, many of the studies have focused on PC keyboard keystrokes. More studies on mobile and smartphones keystroke dynamics are warranted; as smartphones make progress in both hardware and software, features from smartphones have been diversified. In this paper, using various features including keystroke data such as time interval and motion data such as accelerometers and rotation values, we evaluate features with motion data and without motion data. We also compare 5 formulas for motion data, respectively. We also demonstrate that opposite gender match between a legitimate user and impostors has influence on authenticating by our experiment results.<\/jats:p>","DOI":"10.1155\/2018\/2567463","type":"journal-article","created":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T19:30:50Z","timestamp":1521055850000},"page":"1-10","source":"Crossref","is-referenced-by-count":30,"title":["Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6433-5243","authenticated-orcid":true,"given":"Hyungu","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Computer and Information Security, Sejong University, Seoul 05006, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8123-0507","authenticated-orcid":true,"given":"Jung Yeon","family":"Hwang","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute, Daejeon 34113, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0843-8491","authenticated-orcid":true,"given":"Dong In","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Security, Sejong University, Seoul 05006, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0969-8735","authenticated-orcid":true,"given":"Shincheol","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Security, Sejong University, Seoul 05006, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7129-825X","authenticated-orcid":true,"given":"Sung-Hoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Information Security Engineering, University of Science and Technology, Daejeon 34113, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7626-1528","authenticated-orcid":true,"given":"Ji Sun","family":"Shin","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Security, Sejong University, Seoul 05006, Republic of Korea"}]}],"member":"311","reference":[{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.044"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1108\/09685220310489526"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2015.02.118"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1265"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/470274"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-01-2016-0005"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80036-5"},{"issue":"5","key":"15","volume":"4","year":"2012","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"26","year":"2009"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/2567463.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/2567463.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/2567463.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T19:31:03Z","timestamp":1521055863000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/2567463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":10,"alternative-id":["2567463","2567463"],"URL":"https:\/\/doi.org\/10.1155\/2018\/2567463","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}