{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:24:47Z","timestamp":1722943487818},"reference-count":26,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2015]]},"DOI":"10.12720\/jcm.10.6.366-379","type":"journal-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T00:52:02Z","timestamp":1452127922000},"source":"Crossref","is-referenced-by-count":1,"title":["VFA: A Variable-Factor Authentication Framework for Mobile Users"],"prefix":"10.12720","author":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China","sequence":"first","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"first","affiliation":[]},{"given":"Weifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yazhe","family":"Wang","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2015]]},"reference":[{"issue":"no. 1","key":"ref1","first-page":"27","article-title":"Tempting fate","volume":"30","author":"Singer","year":"2005","unstructured":"[1] A. Singer, \"Tempting fate,\" Login, vol. 30, no. 1, pp. 27-30, 2005.","journal-title":"Login"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.1630922"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/grid.2011.41"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2008.04.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-004-0223-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456383"},{"key":"ref11","first-page":"99","article-title":"Implicit authentication through learning user behavior","volume-title":"Proc 13th International Conference on Information Security","author":"Shi","year":"2010","unstructured":"[11] E. Shi, Y. Niu, M. Jakobsson, and R. Chow, \"Implicit authentication through learning user behavior,\" in Proc. 13th International Conference on Information Security, Boca Raton, FL, USA, October 2010, pp. 99\u2013113."},{"key":"ref12","article-title":"Implicit authentication for mobile devices","volume-title":"Proc 4th USENIX Workshop on Hot Topics in Security","author":"Jakobsson","year":"2009","unstructured":"[12] M. Jakobsson, E. Shi, P. Golle, and R. Chow, \"Implicit authentication for mobile devices,\" in Proc. 4th USENIX Workshop on Hot Topics in Security, Montreal, Canada, August 2009."},{"key":"ref13","article-title":"One Experience Collecting Sensitive Mobile Data","author":"Niu","year":"2010","unstructured":"[13] Y. Niu, E. Shi, and R. Chow, \"One Experience Collecting Sensitive Mobile Data,\" in Proc. Usable Security Experiment Reports (USER) Workshop of SOUPS, Redmond, WA, USA, July 2010."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866837"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382240"},{"key":"ref16","first-page":"301","article-title":"Progressive authentication: Deciding when to authenticate on mobile phones","volume-title":"Proc 21st USENIX Conference on Security Symposium","author":"Riva","year":"2012","unstructured":"[16] O. Riva, C. Qin, K. Strauss, and D. Lymberopoulos, \"Progressive authentication: Deciding when to authenticate on mobile phones,\" in Proc. 21st USENIX Conference on Security Symposium, Bellevue, WA, USA, August 2012, pp. 301\u2013316."},{"key":"ref17","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume-title":"Proc 2nd International Conference on Knowledge Discovery and Data Mining","author":"Ester","year":"1996","unstructured":"[17] M. Ester, H. P. Kriegel, J. Sander, and X. Xu, \"A density-based algorithm for discovering clusters in large spatial databases with noise,\" in Proc. 2nd International Conference on Knowledge Discovery and Data Mining, Portland, Oregon, USA, August 1996, pp. 226\u2013231."},{"key":"ref18","first-page":"271","article-title":"AGRID: An efficient algorithm for clustering large high-dimensional datasets","volume-title":"Proc 7th Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Zhao","year":"2003","unstructured":"[18] Y. Zhao and J. Song, \"AGRID: An efficient algorithm for clustering large high-dimensional datasets,\" in Proc. 7th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Seoul, Korea, April 2003, pp. 271 - 282"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2006.10.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11775300_31"},{"key":"ref22","first-page":"121","article-title":"Summarization and matching of density-based clusters in streaming environments","volume-title":"Proc 38th International Conference on Very Large Databases","author":"Yang","year":"2012","unstructured":"[22] D. Yang, E. A. Rundensteiner, and M. O. Ward, \"Summarization and matching of density-based clusters in streaming environments,\" in Proc. 38th International Conference on Very Large Databases, Istanbul, Turkey, August 2012, pp. 121-132."},{"key":"ref23","first-page":"140","article-title":"GDILC: A grid-based density-isoline clustering algorithm","volume-title":"Proc International Conferences on Info-tech and Info-net","author":"Zhao","year":"2001","unstructured":"[23] Y. Zhao and J. Song, \"GDILC: A grid-based density-isoline clustering algorithm,\" in Proc. International Conferences on Info-tech and Info-net, Beijing, China, October 2001, pp. 140\u2013145."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2013.06.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.07.005"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2015\/0629\/20150629022723662.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T21:04:38Z","timestamp":1486155878000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=147&id=814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":26,"URL":"https:\/\/doi.org\/10.12720\/jcm.10.6.366-379","relation":{},"ISSN":["1796-2021"],"issn-type":[{"type":"print","value":"1796-2021"}],"subject":[],"published":{"date-parts":[[2015]]}}}