{"id":"https://openalex.org/W2991582191","doi":"https://doi.org/10.1145/3359789.3359838","title":"Challenge-response behavioral mobile authentication","display_name":"Challenge-response behavioral mobile authentication","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2991582191","doi":"https://doi.org/10.1145/3359789.3359838","mag":"2991582191"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359838","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359838","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359838","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359838","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020892883","display_name":"Manar Mohamed","orcid":"https://orcid.org/0000-0001-5342-0744"},"institutions":[{"id":"https://openalex.org/I83328450","display_name":"Miami University","ror":"https://ror.org/05nbqxr67","country_code":"US","type":"education","lineage":["https://openalex.org/I83328450"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manar Mohamed","raw_affiliation_strings":["Miami University"],"affiliations":[{"raw_affiliation_string":"Miami University","institution_ids":["https://openalex.org/I83328450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017417273","display_name":"Prakash Shrestha","orcid":"https://orcid.org/0000-0002-7779-6399"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prakash Shrestha","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059730489","display_name":"Nitesh Saxena","orcid":"https://orcid.org/0000-0001-6083-104X"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nitesh Saxena","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020892883"],"corresponding_institution_ids":["https://openalex.org/I83328450"],"apc_list":null,"apc_paid":null,"fwci":0.7047,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8009163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"10","issue":null,"first_page":"355","last_page":"365"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8280634880065918},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6846323013305664},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6395806074142456},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6089138388633728},{"id":"https://openalex.org/keywords/interactivity","display_name":"Interactivity","score":0.562659502029419},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5388275384902954},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.513834536075592},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4744064509868622},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4311123788356781},{"id":"https://openalex.org/keywords/gesture","display_name":"Gesture","score":0.41717177629470825},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39197176694869995},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2662753462791443},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.15125134587287903},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0973295271396637}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8280634880065918},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6846323013305664},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6395806074142456},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6089138388633728},{"id":"https://openalex.org/C144430266","wikidata":"https://www.wikidata.org/wiki/Q839721","display_name":"Interactivity","level":2,"score":0.562659502029419},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5388275384902954},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.513834536075592},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4744064509868622},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4311123788356781},{"id":"https://openalex.org/C207347870","wikidata":"https://www.wikidata.org/wiki/Q371174","display_name":"Gesture","level":2,"score":0.41717177629470825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39197176694869995},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2662753462791443},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.15125134587287903},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0973295271396637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3359789.3359838","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359838","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359838","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3359789.3359838","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359838","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359838","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1799174826","display_name":null,"funder_award_id":"CNS-1209280 and CNS-1526524","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2904830345","display_name":"TC: Small: Mobile Phone Password Managers: An Evaluation and a Re-Design based on Human-Perceptible Communication","funder_award_id":"1209280","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G434073065","display_name":"TWC: Small: Collaborative: Spoof-Resistant Smartphone Authentication using Cooperating Wearables","funder_award_id":"1526524","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6194832830","display_name":null,"funder_award_id":"CNS-1526524","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2991582191.pdf","grobid_xml":"https://content.openalex.org/works/W2991582191.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2385227","https://openalex.org/W19399978","https://openalex.org/W591743112","https://openalex.org/W1485033854","https://openalex.org/W1626992774","https://openalex.org/W1824983686","https://openalex.org/W1964160137","https://openalex.org/W1976081290","https://openalex.org/W1978986669","https://openalex.org/W2004960087","https://openalex.org/W2027237225","https://openalex.org/W2028570584","https://openalex.org/W2039031286","https://openalex.org/W2044798763","https://openalex.org/W2055389916","https://openalex.org/W2076804129","https://openalex.org/W2083295738","https://openalex.org/W2108525321","https://openalex.org/W2115218409","https://openalex.org/W2135824353","https://openalex.org/W2149019984","https://openalex.org/W2151854612","https://openalex.org/W2157007820","https://openalex.org/W2159335031","https://openalex.org/W2161032904","https://openalex.org/W2295009507","https://openalex.org/W2325135768","https://openalex.org/W2396609477","https://openalex.org/W2404167293","https://openalex.org/W2404603298","https://openalex.org/W2560814590","https://openalex.org/W2582173949","https://openalex.org/W2626839242","https://openalex.org/W2790381848","https://openalex.org/W2791908823","https://openalex.org/W2903621324","https://openalex.org/W2963930878","https://openalex.org/W4299412096"],"related_works":["https://openalex.org/W2319020389","https://openalex.org/W2001821990","https://openalex.org/W2272707781","https://openalex.org/W2747851897","https://openalex.org/W1975913006","https://openalex.org/W1513662110","https://openalex.org/W2063506784","https://openalex.org/W4240086805","https://openalex.org/W2521348551","https://openalex.org/W2013411520"],"abstract_inverted_index":{"The":[0,98,107],"most":[1],"researched":[2],"behavioral":[3],"biometrics":[4],"for":[5,86,112],"mobile":[6,87,181],"device":[7,182],"authentication":[8,84],"involves":[9],"the":[10,16,24,33,38,64,71,135,161,174,186],"use":[11,175,193],"of":[12,42,76,79,115,137,176,189],"touch":[13],"gestures":[14,195],"as":[15],"user":[17,138],"enters":[18],"a":[19,122],"graphical":[20,94,105],"pattern":[21,95,147],"password":[22],"(like":[23],"one":[25],"used":[26],"on":[27,103,121,180],"Android)":[28],"or":[29],"otherwise":[30],"interacts":[31],"with":[32,140],"device.":[34],"However,":[35],"due":[36],"to":[37,48,58,92,145,184],"inherent":[39],"static":[40,66,93,146],"nature":[41],"these":[43,141],"schemes,":[44],"they":[45],"are":[46],"vulnerable":[47],"impersonation":[49,164],"attacks.":[50,165],"In":[51],"this":[52,60],"paper,":[53],"we":[54,152],"investigate":[55],"challenge-response":[56,81],"mechanisms":[57],"address":[59],"security":[61,162],"vulnerability":[62],"underlying":[63],"traditional":[65],"biometric":[67,83,149],"schemes.":[68],"We":[69],"study":[70],"performance,":[72],"security,":[73],"and":[74,89,157,197],"usability":[75],"two":[77],"schemes":[78,190],"such":[80],"interactive":[82,128],"geared":[85],"devices":[88,116],"contrast":[90],"them":[91],"based":[96,102,120,148],"biometrics.":[97],"first":[99],"scheme":[100],"is":[101,119,143],"random":[104,129],"patterns.":[106],"second":[108],"scheme,":[109],"recently":[110],"introduced":[111],"PC":[113],"class":[114],"(not":[117],"mobile),":[118],"simple":[123],"cognitive":[124],"game":[125],"involving":[126],"semantic":[127],"challenges.":[130],"Our":[131],"results":[132],"show":[133],"that":[134,154,173,191],"accuracy":[136,188],"identification":[139,187],"approaches":[142],"similar":[144],"scheme.":[150],"Finally,":[151],"argue":[153],"utilizing":[155],"interactivity":[156],"randomization":[158],"significantly":[159],"enhance":[160],"against":[163],"As":[166],"an":[167],"independent":[168],"result,":[169],"our":[170],"work":[171],"demonstrates":[172],"motion":[177],"sensors":[178],"available":[179],"serves":[183],"improve":[185],"only":[192],"touch-based":[194],"(static":[196],"interactive).":[198]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
