{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:38:03Z","timestamp":1725626283278},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/cvprw.2016.31","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T16:57:08Z","timestamp":1482166628000},"page":"195-203","source":"Crossref","is-referenced-by-count":1,"title":["CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition"],"prefix":"10.1109","author":[{"given":"Ethan M.","family":"Rudd","sequence":"first","affiliation":[]},{"given":"Terrance E.","family":"Boult","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699047"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712713"},{"key":"ref12","article-title":"Secure voice-based authentication for mobile devices: vaulted voice verification","author":"johnson","year":"2013","journal-title":"SPIE Defense Security and Sensing"},{"journal-title":"Privacy enhanced remote voice verification","year":"2014","author":"johnson","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"year":"2000","author":"klosterman","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80165-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071036"},{"key":"ref19","article-title":"A survey of stealth malware: Attacks, mitigation measures, and steps toward autonomous open world solutions","author":"rudd","year":"2016","journal-title":"arXiv preprint arXiv 1603 02895"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10700-008-9034-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9324-6_4"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77566-9_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref2","article-title":"Remote authentication using vaulted fingerprint verification","author":"alzahrani","year":"2014","journal-title":"SPIE Defense+ Security pages 90750K-90750K International Society for Optics and Photonics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIC-STH.2009.5444466"},{"journal-title":"Project abacus is an atap project aimed at killing the password","year":"2015","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5230-9_3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1010"},{"year":"1995","author":"shepherd","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239222"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2012.6163018"}],"event":{"name":"2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","start":{"date-parts":[[2016,6,26]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2016,7,1]]}},"container-title":["2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784518\/7789490\/07789521.pdf?arnumber=7789521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T14:47:00Z","timestamp":1568645220000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7789521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cvprw.2016.31","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}