{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:55:38Z","timestamp":1771955738241,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008382","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["2022.11452.BD"],"award-info":[{"award-number":["2022.11452.BD"]}],"id":[{"id":"10.13039\/100008382","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.23919\/ifipnetworking57963.2023.10186419","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T13:38:31Z","timestamp":1690205911000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations"],"prefix":"10.23919","author":[{"given":"Maria","family":"Papaioannou","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Aveiro,Portugal"}]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Aveiro,Portugal"}]},{"given":"Emmanouil Manos","family":"Panaousis","sequence":"additional","affiliation":[{"name":"University of Greenwich,Faculty of Engineering and Science,Chatham Maritime,UK"}]},{"given":"Aliyah","family":"Essop","sequence":"additional","affiliation":[{"name":"University of Greenwich,Faculty of Engineering and Science,Chatham Maritime,UK"}]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Aveiro,Portugal"}]},{"given":"Victor","family":"Sucasas","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref13","year":"2017","journal-title":"'How long since you took a hard look at your cybersecurity? &#x2018;"},{"key":"ref12","author":"ye","year":"2017","journal-title":"Cracking Android Pattern Lock in Five Attempts"},{"key":"ref15","first-page":"30","article-title":"Snap auth: a gesture-based unobtrusive smartwatch user authentication scheme","author":"buriro","year":"0","journal-title":"International Workshop on Emerging Technologies for Authorization and Authentication"},{"key":"ref14","author":"forsblom","year":"2015","journal-title":"Were You Aware of All These Sensors in Your Smartphone?"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.08.021"},{"key":"ref17","author":"sloane","year":"2017","journal-title":"Behavioral biometrics the restructuring of the authentication landscape"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2892440"},{"key":"ref19","year":"2016","journal-title":"suite single sign-on on an android device"},{"key":"ref18","volume":"1","author":"schneier","year":"1996","journal-title":"Applied Cryptography"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093529"},{"key":"ref45","author":"khan","year":"2022","journal-title":"Mouse Dynamics Behavioral Biometrics A Survey"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CCIP.2015.7100681"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3077954"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2555335"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s23062979"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_10"},{"key":"ref49","year":"2013","journal-title":"Standards for Biometric Technologies"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2649598"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.20"},{"key":"ref9","first-page":"213","article-title":"It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception","author":"harbach","year":"0","journal-title":"SOUPS '14 Proc Tenth Symp Usable Priv Secur"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD52502.2021.9617809"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4049"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.3390\/s22072449","article-title":"Blockchain-Based Security Mechanisms for IoMT Edge Networks in IoMT-Based Healthcare Monitoring Systems","volume":"22","author":"pelekoudas-oikonomou","year":"2022","journal-title":"SENSORS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s21041528"},{"key":"ref40","first-page":"65","volume":"8","author":"abuhamad","year":"2021","journal-title":"Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics A Contemporary Survey"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164245"},{"key":"ref34","first-page":"1411","article-title":"I feel like i'm taking selfies all day! towards understanding biometric authentication on smartphones","volume":"2015 april","author":"de luca","year":"0","journal-title":"Conf Hum Factors Comput Syst - Proc"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000843"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304908"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053504"},{"key":"ref30","first-page":"219","author":"attaullah","year":"2017","journal-title":"Evaluation of Motion-based Touch-typing Biometrics in Online Financial Environments"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP49049.2020.9249574"},{"key":"ref32","author":"obuchi","year":"2006","journal-title":"PDA Speech Database"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3084538"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445624"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD52502.2021.9617802"},{"key":"ref38","first-page":"180","article-title":"Risk-based user authentication for mobile passenger ID devices for land and sea border control","author":"papaioannou","year":"0","journal-title":"2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)"},{"key":"ref24","author":"charles","year":"2013","journal-title":"The guardian-iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club"},{"key":"ref23","author":"kovach","year":"2017","journal-title":"Business insider-Samsung's Galaxy S8 facial recognition feature can be fooled with a photo"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2021-0124"},{"key":"ref25","author":"mcgoogan","year":"2017","journal-title":"Peace sign selfies could let hackers copy your fingerprints"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1132736.1132768"},{"key":"ref22","author":"titcomb","year":"2017","journal-title":"Hackers claim to beat iPhone X's face id in one week with 115 mask"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08786-3_2"},{"key":"ref28","first-page":"205","article-title":"Biometric gait recognition for mobile devices using wavelet transform and support vector machines","author":"hestbek","year":"0","journal-title":"2012 19th Int Conf Syst Signals Image Process IWSSIP 2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2686855"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-03-2015-0017"}],"event":{"name":"2023 IFIP Networking Conference (IFIP Networking)","location":"Barcelona, Spain","start":{"date-parts":[[2023,6,12]]},"end":{"date-parts":[[2023,6,15]]}},"container-title":["2023 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10186376\/10186354\/10186419.pdf?arnumber=10186419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:23:40Z","timestamp":1690219420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10186419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":49,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking57963.2023.10186419","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]}}}