{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:17:24Z","timestamp":1743031044339,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030397487"},{"type":"electronic","value":"9783030397494"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39749-4_7","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T18:03:07Z","timestamp":1579888987000},"page":"104-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reflexive Memory Authenticator: A\u00a0Proposal for Effortless Renewable Biometrics"],"prefix":"10.1007","author":[{"given":"Nikola K.","family":"Blanchard","sequence":"first","affiliation":[]},{"given":"Siargey","family":"Kachanovich","sequence":"additional","affiliation":[]},{"given":"Ted","family":"Selker","sequence":"additional","affiliation":[]},{"given":"Florentin","family":"Waligorski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10207-012-0161-x","volume":"12","author":"HJ Asghar","year":"2013","unstructured":"Asghar, H.J., Li, S., Pieprzyk, J., Wang, H.: Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Secur. 12(2), 83\u201396 (2013)","journal-title":"Int. J. Inf. Secur."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ashby, C., Bhatia, A., Tenore, F., Vogelstein, J.: Low-cost electroencephalogram (EEG) based authentication. In: 5th International IEEE\/EMBS Conference on Neural Engineering - NER, pp. 442\u2013445. IEEE (2011)","DOI":"10.1109\/NER.2011.5910581"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1007\/11499145_79","volume-title":"Image Analysis","author":"R Bednarik","year":"2005","unstructured":"Bednarik, R., Kinnunen, T., Mihaila, A., Fr\u00e4nti, P.: Eye-movements as a biometric. In: Kalviainen, H., Parkkinen, J., Kaarna, A. (eds.) SCIA 2005. LNCS, vol. 3540, pp. 780\u2013789. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11499145_79"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on Security and Privacy, pp. 538\u2013552 (5 2012). https:\/\/doi.org\/10.1109\/SP.2012.49","DOI":"10.1109\/SP.2012.49"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.cviu.2007.08.005","volume":"110","author":"KW Bowyer","year":"2008","unstructured":"Bowyer, K.W., Hollingsworth, K., Flynn, P.J.: Image understanding for iris biometrics: a survey. Comput. Vis. Image Underst. 110(2), 281\u2013307 (2008)","journal-title":"Comput. Vis. Image Underst."},{"issue":"9","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.1111\/psyp.12442","volume":"52","author":"MM Bradley","year":"2015","unstructured":"Bradley, M.M., Lang, P.J.: Memory, emotion, and pupil diameter: repetition of natural scenes. Psychophysiology 52(9), 1186\u20131193 (2015)","journal-title":"Psychophysiology"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-1-4471-0515-2_27","volume-title":"People and Computers XIV \u2013 Usability or Else!: Proceedings of HCI","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? A field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV \u2013 Usability or Else!: Proceedings of HCI, pp. 405\u2013424. Springer, London (2000). https:\/\/doi.org\/10.1007\/978-1-4471-0515-2_27"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Biddle, R., van Oorschot, P.C.: A second look at the usability of click-based graphical passwords. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 1\u201312. ACM, New York (2007)","DOI":"10.1145\/1280680.1280682"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"1850006","DOI":"10.1142\/S0219467818500067","volume":"18","author":"B Choudhury","year":"2018","unstructured":"Choudhury, B., Then, P., Issac, B., Raman, V., Haldar, M.: A survey on biometrics and cancelable biometrics systems. Int. J. Image Graph. 18, 1850006 (2018)","journal-title":"Int. J. Image Graph."},{"key":"7_CR10","unstructured":"Cody, S.: Do Only The Eyes Have It? Predicting subsequent memory with simultaneous neural and pupillometry data. Master\u2019s thesis, The Ohio State University (2015)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Curran, M.T., Yang, J., Merrill, N., Chuang, J.: Passthoughts authentication with low cost EarEEG. In: IEEE 38th Annual International Conference of the Engineering in Medicine and Biology Society - EMBC, pp. 1979\u20131982. IEEE (2016)","DOI":"10.1109\/EMBC.2016.7591112"},{"issue":"3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/LSP.2016.2516043","volume":"23","author":"R Das","year":"2016","unstructured":"Das, R., Maiorana, E., Campisi, P.: EEG biometrics using visual stimuli: a longitudinal study. IEEE Signal Process. Lett. 23(3), 341\u2013345 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Deravi, F., Guness, S.P.: Gaze trajectory as a biometric modality. In: Biosignals, pp. 335\u2013341 (2011)","DOI":"10.5220\/0003275803350341"},{"key":"7_CR14","series-title":"Cognitive Science and Technology","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-981-10-0213-7_7","volume-title":"Computational and Cognitive Neuroscience of Vision","author":"W Einh\u00e4user","year":"2017","unstructured":"Einh\u00e4user, W.: The pupil as marker of cognitive processes. In: Zhao, Q. (ed.) Computational and Cognitive Neuroscience of Vision. CST, pp. 141\u2013169. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-0213-7_7"},{"key":"7_CR15","unstructured":"Ferrante, M., Saltalamacchia, M.: The coupon collector\u2019s problem. Materials Matem\u00e0tics 0001\u201335 (2014)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-38989-4_14","volume-title":"Pattern Recognition","author":"C Galdi","year":"2013","unstructured":"Galdi, C., Nappi, M., Riccio, D., Cantoni, V., Porta, M.: A new gaze analysis based soft-biometric. In: Carrasco-Ochoa, J.A., Mart\u00ednez-Trinidad, J.F., Rodr\u00edguez, J.S., di Baja, G.S. (eds.) MCPR 2013. LNCS, vol. 7914, pp. 136\u2013144. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38989-4_14"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.patrec.2016.11.002","volume":"84","author":"C Galdi","year":"2016","unstructured":"Galdi, C., Nappi, M., Riccio, D., Wechsler, H.: Eye movement analysis for human authentication: a critical survey. Pattern Recogn. Lett. 84, 272\u2013283 (2016)","journal-title":"Pattern Recogn. Lett."},{"key":"7_CR18","unstructured":"German, R.L., Barber, K.S.: Consumer attitudes about biometric authentication. Technical report, University of Texas at Austin Center for Identity (2018)"},{"key":"7_CR19","unstructured":"Golla, M., Schnitzler, T., D\u00fcrmuth, M.: Will any password do? Exploring rate-limiting on the web. In: Who Are You ?! Adventures in Authentication (2016)"},{"issue":"6","key":"7_CR20","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1111\/psyp.12412","volume":"52","author":"CA Gomes","year":"2015","unstructured":"Gomes, C.A., Montaldi, D., Mayes, A.: The pupil as an indicator of unconscious memory: introducing the pupil priming effect. Psychophysiology 52(6), 754\u2013769 (2015)","journal-title":"Psychophysiology"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Jensen, W., Gavrila, S., Korolev, V., et al.: Picture password: a visual login technique for mobile devices. Technical report, National Institute of Standards and Technology (2003)","DOI":"10.6028\/NIST.IR.7030"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Just, M., Aspinall, D.: Personal choice and challenge questions: a security and usability assessment. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 8. ACM (2009)","DOI":"10.1145\/1572532.1572543"},{"issue":"1","key":"7_CR23","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2202\/1944-2866.1013","volume":"2","author":"M Just","year":"2010","unstructured":"Just, M., Aspinall, D.: Challenging challenge questions: an experimental analysis of authentication technologies and user behaviour. Policy Internet 2(1), 99\u2013115 (2010)","journal-title":"Policy Internet"},{"issue":"10","key":"7_CR24","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1080\/17470218.2011.588335","volume":"64","author":"A Kafkas","year":"2011","unstructured":"Kafkas, A., Montaldi, D.: Recognition memory strength is predicted by pupillary responses at encoding while fixation patterns distinguish recollection from familiarity. Q. J. Exp. Psychol. 64(10), 1971\u20131989 (2011)","journal-title":"Q. J. Exp. Psychol."},{"issue":"11","key":"7_CR25","first-page":"123","volume":"3","author":"S Karthika","year":"2014","unstructured":"Karthika, S., Devaki, P.: An efficient user authentication using captcha and graphical passwords - a survey. Int. J. Sci. Res. 3(11), 123 (2014)","journal-title":"Int. J. Sci. Res."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Kasprowski, P., Komogortsev, O.V., Karpov, A.: First eye movement verification and identification competition at BTAS 2012. In: IEEE 5th International Conference on Biometrics: Theory, Applications and Systems - BTAS, pp. 195\u2013202. IEEE (2012)","DOI":"10.1109\/BTAS.2012.6374577"},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0021-9800(67)80075-9","volume":"3","author":"MS Klamkin","year":"1967","unstructured":"Klamkin, M.S., Newman, D.J.: Extensions of the birthday surprise. J. Comb. Theory 3(3), 279\u2013282 (1967)","journal-title":"J. Comb. Theory"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kollreider, K., Fronthaler, H., Bigun, J.: Evaluating liveness by face images and the structure tensor. In: IEEE 4th Workshop on Automatic Identification Advanced Technologies - AutoID, pp. 75\u201380, October 2005","DOI":"10.1109\/AUTOID.2005.20"},{"key":"7_CR29","unstructured":"Lashkari, A.H., Farmand, S., Zakaria, O.B., Saleh, R.: Shoulder surfing attack in graphical password authentication. Int. J. Comput. Sci. Inf. Secur. - IJCSIS 6(2) (2009). http:\/\/arxiv.org\/abs\/0912.0951"},{"issue":"3","key":"7_CR30","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jnca.2009.12.011","volume":"33","author":"C Lee","year":"2010","unstructured":"Lee, C., Kim, J.: Cancelable fingerprint templates using minutiae-based bit-strings. J. Netw. Comput. Appl. 33(3), 236\u2013246 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"7_CR31","volume-title":"The History of Information Security: A Comprehensive Handbook","author":"KMM de Leeuw","year":"2007","unstructured":"de Leeuw, K.M.M., Bergstra, J.: The History of Information Security: A Comprehensive Handbook. Elsevier, Amsterdam (2007)"},{"issue":"4","key":"7_CR32","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/0010-0285(72)90021-7","volume":"3","author":"GR Loftus","year":"1972","unstructured":"Loftus, G.R.: Eye fixations and recognition memory for pictures. Cogn. Psychol. 3(4), 525\u2013551 (1972)","journal-title":"Cogn. Psychol."},{"issue":"4","key":"7_CR33","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TPAMI.2007.1012","volume":"29","author":"S Marcel","year":"2007","unstructured":"Marcel, S., Mill\u00e1n, J.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 743\u2013752 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"McCulley, S., Roussev, V.: Latent typing biometrics in online collaboration services. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, pp. 66\u201376. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3274694.3274754","DOI":"10.1145\/3274694.3274754"},{"issue":"10","key":"7_CR35","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1002\/sec.788","volume":"7","author":"D Moon","year":"2014","unstructured":"Moon, D., Yoo, J.H., Lee, M.K.: Improved cancelable fingerprint templates using minutiae-based functional transform. Secur. Commun. Netw. 7(10), 1543\u20131551 (2014). https:\/\/doi.org\/10.1002\/sec.788","journal-title":"Secur. Commun. Netw."},{"key":"7_CR36","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6, 156\u2013163 (1967). https:\/\/doi.org\/10.1016\/S0022-5371(67)80067-7","journal-title":"J. Verbal Learn. Verbal Behav."},{"issue":"2","key":"7_CR37","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1167\/13.2.11","volume":"13","author":"M Naber","year":"2013","unstructured":"Naber, M., Fr\u00e4ssle, S., Rutishauser, U., Einh\u00e4user, W.: Pupil size signals novelty and predicts later retrieval success for declarative memories of natural scenes. J. Vis. 13(2), 11\u201311 (2013)","journal-title":"J. Vis."},{"issue":"9","key":"7_CR38","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1016\/0042-6989(71)90213-6","volume":"11","author":"D Noton","year":"1971","unstructured":"Noton, D., Stark, L.: Scanpaths in saccadic eye movements while viewing and recognizing patterns. Vis. Res. 11(9), 929\u2013942 (1971)","journal-title":"Vis. Res."},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-319-05476-6_41","volume-title":"Intelligent Information and Database Systems","author":"N Phetmak","year":"2014","unstructured":"Phetmak, N., Liwlompaisan, W., Boonma, P.: Travel password: a secure and memorable password scheme. In: Nguyen, N.T., Attachoo, B., Trawi\u0144ski, B., Somboonviwat, K. (eds.) ACIIDS 2014. LNCS (LNAI), vol. 8397, pp. 402\u2013411. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05476-6_41"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Rajan, R., Selker, T., Lane, I.: Task load estimation and mediation using psycho-physiological measures. In: Proceedings of the 21st International Conference on Intelligent User Interfaces, pp. 48\u201359. ACM (2016)","DOI":"10.1145\/2856767.2856769"},{"issue":"1","key":"7_CR41","doi-asserted-by":"publisher","first-page":"13","DOI":"10.3758\/BF03336753","volume":"11","author":"K Rayner","year":"1978","unstructured":"Rayner, K.: Eye movement latencies for parafoveally presented words. Bull. Psychon. Soc. 11(1), 13\u201316 (1978)","journal-title":"Bull. Psychon. Soc."},{"issue":"4","key":"7_CR42","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TBCAS.2008.2003432","volume":"2","author":"PV Reddy","year":"2008","unstructured":"Reddy, P.V., Kumar, A., Rahman, S., Mundra, T.S.: A new antispoofing approach for biometric devices. IEEE Trans. Biomed. Circ. Syst. 2(4), 328\u201337 (2008)","journal-title":"IEEE Trans. Biomed. Circ. Syst."},{"key":"7_CR43","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.inffus.2015.08.003","volume":"32","author":"I Rigas","year":"2016","unstructured":"Rigas, I., Abdulin, E., Komogortsev, O.: Towards a multi-source fusion approach for eye movement-driven recognition. Inf. Fusion 32, 13\u201325 (2016)","journal-title":"Inf. Fusion"},{"issue":"1","key":"7_CR44","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.cose.2006.12.008","volume":"26","author":"C Roberts","year":"2007","unstructured":"Roberts, C.: Biometric attack vectors and defences. Comput. Secur. 26(1), 14\u201325 (2007)","journal-title":"Comput. Secur."},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Schechter, S., Brush, A.J.B., Egelman, S.: It\u2019s no secret. Measuring the security and reliability of authentication via \u201csecret\u201d questions. In: 30th IEEE Symposium on Security and Privacy, pp. 375\u2013390. IEEE (2009)","DOI":"10.1109\/SP.2009.11"},{"key":"7_CR46","unstructured":"Segreti, S.M., et al.: Diversify to survive: making passwords stronger with adaptive policies. In: 13th Symposium on Usable Privacy and Security - SOUPS, pp. 1\u201312. USENIX Association, Santa Clara, CA (2017)"},{"key":"7_CR47","doi-asserted-by":"publisher","unstructured":"Selker, T.: Understanding considerate systems - UCS (pronounced: You see us). In: 2010 International Symposium on Collaborative Technologies and Systems, pp. 1\u201312, May 2010. https:\/\/doi.org\/10.1109\/CTS.2010.5478532","DOI":"10.1109\/CTS.2010.5478532"},{"key":"7_CR48","unstructured":"Shape: 2018 credential spill report. Technical report, Shape Security (2018)"},{"issue":"5","key":"7_CR49","doi-asserted-by":"publisher","first-page":"628","DOI":"10.4218\/etrij.09.0209.0137","volume":"31","author":"SW Shin","year":"2009","unstructured":"Shin, S.W., Lee, M.K., Moon, D., Moon, K.: Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI J. 31(5), 628\u2013630 (2009)","journal-title":"ETRI J."},{"issue":"9","key":"7_CR50","first-page":"11","volume":"12","author":"S Singh","year":"2011","unstructured":"Singh, S., Agarwal, G.: Integration of sound signature in graphical password authentication system. Int. J. Comput. Appl. 12(9), 11\u201313 (2011)","journal-title":"Int. J. Comput. Appl."},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Sluganovic, I., Roeschlin, M., Rasmussen, K.B., Martinovic, I.: Using reflexive eye movements for fast challenge-response authentication. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1056\u20131067. ACM, New York (2016)","DOI":"10.1145\/2976749.2978311"},{"issue":"1\u20132","key":"7_CR52","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Hum Comput Stud."},{"issue":"8","key":"7_CR53","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/0167-4048(90)90115-A","volume":"9","author":"M Zviran","year":"1990","unstructured":"Zviran, M., Haga, W.J.: Cognitive passwords: the key to easy access control. Comput. Secur. 9(8), 723\u2013736 (1990)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39749-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T23:04:00Z","timestamp":1737673440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-39749-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030397487","9783030397494"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39749-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iit.cnr.it\/etaa2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}