{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:53:59Z","timestamp":1776120839307,"version":"3.50.1"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030584641","type":"print"},{"value":"9783030584658","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58465-8_5","type":"book-chapter","created":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T23:04:02Z","timestamp":1598828642000},"page":"61-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["GazeRoomLock: Using Gaze and Head-Pose to Improve the Usability and Observation Resistance of 3D Passwords in Virtual Reality"],"prefix":"10.1007","author":[{"given":"Ceenu","family":"George","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Buschek","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Ngao","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Abdrabou, Y., Khamis, M., Eisa, R.M., Ismail, S., Elmougy, A.: Just gaze and wave: exploring the use of gaze and gestures for shoulder-surfing resilient authentication. In: Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ETRA 2019. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3314111.3319837. http:\/\/doi.acm.org\/10.1145\/3314111.3319837","DOI":"10.1145\/3314111.3319837"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Alallah, F., et al.: Performer vs. observer: whose comfort level should we consider when examining the social acceptability of input modalities for head-worn display? In: Proceedings of the 24th ACM Symposium on Virtual Reality Software and Technology. VRST 2018. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3281505.3281541. http:\/\/doi.acm.org.emedien.ub.uni-muenchen.de\/10.1145\/3281505.3281541","DOI":"10.1145\/3281505.3281541"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TIM.2008.919905","volume":"57","author":"F Alsulaiman","year":"2008","unstructured":"Alsulaiman, F., El Saddik, A.: Three-dimensional password for more secure authentication. IEEE Trans. Instrum. Meas. 57, 1929\u20131938 (2008). https:\/\/doi.org\/10.1109\/TIM.2008.919905","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Andrist, S., Gleicher, M., Mutlu, B.: Looking coordinated: bidirectional gaze mechanisms for collaborative interaction with virtual characters. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. CHI 2017. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3025453.3026033. http:\/\/doi.acm.org\/10.1145\/3025453.3026033","DOI":"10.1145\/3025453.3026033"},{"key":"5_CR5","unstructured":"Attree, E., Brooks, B., Rose, F., Andrews, T., Leadbetter, A., Clifford, B.: Memory processes and virtual environments: i can\u2019t remember what was there, but i can remember how i got there. Implications for people with disabilities. In: ECDVRAT: 1st European Conference on Disability, Virtual Reality and Associated Technologies, Reading, UK, vol. 118 (1996)"},{"key":"5_CR6","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies. WOOT 2010. USENIX Association, Berkeley (2010). http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009"},{"key":"5_CR7","unstructured":"Brignull, H., Rogers, Y.: Enticing people to interact with large public displays in public spaces (2003)"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Chan, L.W., Kao, H.S., Chen, M.Y., Lee, M.S., Hsu, J., Hung, Y.P.: Touching the void: direct-touch interaction for intangible displays. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2010. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1753326.1753725. http:\/\/doi.acm.org\/10.1145\/1753326.1753725","DOI":"10.1145\/1753326.1753725"},{"key":"5_CR9","unstructured":"Clayton, D.: Repeated ordinal measurements: a generalised estimating equation approach (1992)"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"De Luca, A., Denzel, M., Hussmann, H.: Look into my eyes!: can you guess my password? In: Proceedings of the 5th Symposium on Usable Privacy and Security. SOUPS 2009, ACM, New York (2009). https:\/\/doi.org\/10.1145\/1572532.1572542. http:\/\/doi.acm.org\/10.1145\/1572532.1572542","DOI":"10.1145\/1572532.1572542"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"De Luca, A., et al.: Now you see me, now you don\u2019t: protecting smartphone authentication from shoulder surfers. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2014. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2556288.2557097. http:\/\/doi.acm.org\/10.1145\/2556288.2557097","DOI":"10.1145\/2556288.2557097"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-540-74800-7_43","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"H Drewes","year":"2007","unstructured":"Drewes, H., Schmidt, A.: Interacting with the computer using gaze gestures. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 475\u2013488. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74800-7_43"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Esteves, A., Velloso, E., Bulling, A., Gellersen, H.: Orbits: gaze interaction for smart watches using smooth pursuit eye movements. In: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. UIST 2015. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2807442.2807499. http:\/\/doi.acm.org\/10.1145\/2807442.2807499","DOI":"10.1145\/2807442.2807499"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., Oakley, I.: Smoothmoves: smooth pursuits head movements for augmented reality. In: Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology. UIST 2017. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3126594.3126616. http:\/\/doi.acm.org\/10.1145\/3126594.3126616","DOI":"10.1145\/3126594.3126616"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2010. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1753326.1753491. http:\/\/doi.acm.org\/10.1145\/1753326.1753491","DOI":"10.1145\/1753326.1753491"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"George, C., Buschek, D., Khamis, M., Hussmann, H.: Investigating the third dimension for authentication in immersive virtual reality and in the real world. In: 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR) (2019)","DOI":"10.1109\/VR.2019.8797862"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"George, C., Janssen, P., Heuss, D., Alt, F.: Should i interrupt or not?: understanding interruptions in head-mounted display settings. In: Proceedings of the 2019 on Designing Interactive Systems Conference. DIS 2019. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3322276.3322363. http:\/\/doi.acm.org\/10.1145\/3322276.3322363","DOI":"10.1145\/3322276.3322363"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"George, C., et al.: Seamless and secure VR: adapting and evaluating established authentication systems for virtual reality. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2017). USEC 2017. Internet Society (2017). https:\/\/doi.org\/10.14722\/usec.2017.23028. http:\/\/dx.doi.org\/10.14722\/usec.2017.23028","DOI":"10.14722\/usec.2017.23028"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Gugenheimer, J., Mai, C., Mcgill, M., Williamson, J.R., Steinicke, F., Perlin, K.: Challenges using head-mounted displays in shared and social spaces. In: Proceedings of the 37th Annual ACM Conference on Human Factors in Computing Systems. CHI EA 2019. ACM, New York (2019)","DOI":"10.1145\/3290607.3299028"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"324","DOI":"10.4236\/ijcns.2017.108B035","volume":"10","author":"J Gurary","year":"2017","unstructured":"Gurary, J., Zhu, Y., Fu, H.: Leveraging 3D benefits for authentication. Int. J. Commun. Netw. Syst. Sci. 10, 324\u2013338 (2017). https:\/\/doi.org\/10.4236\/ijcns.2017.108B035","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"5_CR21","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., Luca, A.D., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Symposium On Usable Privacy and Security (SOUPS 2014), pp. 213\u2013230. USENIX Association, Menlo Park (2014). https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/harbach"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Jacob, R.J.K.: The use of eye movements in human-computer interaction techniques: what you look at is what you get. ACM Trans. Inf. Syst. 9(2) (1991). https:\/\/doi.org\/10.1145\/123078.128728. http:\/\/doi.acm.org\/10.1145\/123078.128728","DOI":"10.1145\/123078.128728"},{"key":"5_CR23","doi-asserted-by":"publisher","unstructured":"John, B., Koppal, S., Jain, E.: Eyeveil: degrading iris authentication in eye tracking headsets. In: Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. ETRA 2019. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3314111.3319816. http:\/\/doi.acm.org\/10.1145\/3314111.3319816","DOI":"10.1145\/3314111.3319816"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Katsini, C., Abdrabou, Y., Raptis, G.E., Khamis, M., Alt, F.: The role of eye gaze in security and privacy applications: survey and future HCI research directions. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. CHI 2020, pp. 1\u201321. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376840. https:\/\/doi.org\/10.1145\/3313831.3376840","DOI":"10.1145\/3313831.3376840"},{"key":"5_CR25","unstructured":"Keith, M., Shao, B., Steinbart, P.: A behavioral analysis of passphrase design and effectiveness. J. Assoc. Inf. Syst. 10(2) (2009). https:\/\/aisel.aisnet.org\/jais\/vol10\/iss2\/2"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Pfeuffer, K., Geiger, M.J., Prange, S., Mecke, L., Buschek, D., Alt, F.: Behavioural biometrics in VR: identifying people from body motion and relations in virtual reality. In: Proceedings of the 37th Annual ACM Conference on Human Factors in Computing Systems. CHI 2019. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3290605.3300340. https:\/\/doi.org\/10.1145\/3290605.3300340","DOI":"10.1145\/3290605.3300340"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: Gazetouchpass: multimodal authentication using gaze and touch on mobile devices. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. CHI EA 2016. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2851581.2892314. http:\/\/doi.acm.org\/10.1145\/2851581.2892314","DOI":"10.1145\/2851581.2892314"},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Khamis, M., Hassib, M., Zezschwitz, E.V., Bulling, A., Alt, F.: Gazetouchpin: protecting sensitive data on mobile devices using secure multimodal authentication. In: Proceedings of the 19th ACM International Conference on Multimodal Interaction. ICMI 2017. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3136755.3136809. http:\/\/doi.acm.org\/10.1145\/3136755.3136809","DOI":"10.1145\/3136755.3136809"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Khamis, M., Oechsner, C., Alt, F., Bulling, A.: Vrpursuits: interaction in virtual reality using smooth pursuit eye movements. In: Proceedings of the 2018 International Conference on Advanced Visual Interfaces. AVI 2018. ACM, New York (2018)","DOI":"10.1145\/3206505.3206522"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"Khamis, M., et al.: Cueauth: comparing touch, mid-air gestures, and gaze for cue-based authentication on situated displays. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4) (2018). https:\/\/doi.org\/10.1145\/3287052. https:\/\/doi.org\/10.1145\/3287052","DOI":"10.1145\/3287052"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Kinnunen, T., Sedlak, F., Bednarik, R.: Towards task-independent person authentication using eye movement signals. In: Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications. ETRA 2010, ACM, New York (2010). https:\/\/doi.org\/10.1145\/1743666.1743712. http:\/\/doi.acm.org\/10.1145\/1743666.1743712","DOI":"10.1145\/1743666.1743712"},{"key":"5_CR32","doi-asserted-by":"publisher","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 3rd Symposium on Usable Privacy and Security. SOUPS 2007. ACM, New York (2007). https:\/\/doi.org\/10.1145\/1280680.1280683. http:\/\/doi.acm.org\/10.1145\/1280680.1280683","DOI":"10.1145\/1280680.1280683"},{"key":"5_CR33","doi-asserted-by":"publisher","unstructured":"Kyt\u00f6, M., Ens, B., Piumsomboon, T., Lee, G.A., Billinghurst, M.: Pinpointing: precise head- and eye-based target selection for augmented reality. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. CHI 2018. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3173574.3173655. http:\/\/doi.acm.org.emedien.ub.uni-muenchen.de\/10.1145\/3173574.3173655","DOI":"10.1145\/3173574.3173655"},{"key":"5_CR34","unstructured":"Labs, P.: HTC Vive eye tracking add on (2016). https:\/\/pupil-labs.com\/blog\/2016-08\/htc-vive-eye-tracking-add-on\/. Accessed 01 Apr 2019"},{"key":"5_CR35","doi-asserted-by":"publisher","unstructured":"Mai, C., Khamis, M.: Public HMDS: modeling and understanding user behavior around public head-mounted displays. In: Proceedings of the 7th ACM International Symposium on Pervasive Displays. PerDis 2018. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3205873.3205879. http:\/\/doi.acm.org\/10.1145\/3205873.3205879","DOI":"10.1145\/3205873.3205879"},{"key":"5_CR36","doi-asserted-by":"publisher","unstructured":"Majaranta, P., Aula, A., R\u00e4ih\u00e4, K.J.: Effects of feedback on eye typing with a short dwell time. In: Proceedings of the 2004 Symposium on Eye Tracking Research & Applications. ETRA 2004. ACM, New York (2004). https:\/\/doi.org\/10.1145\/968363.968390. http:\/\/doi.acm.org\/10.1145\/968363.968390","DOI":"10.1145\/968363.968390"},{"key":"5_CR37","series-title":"Human\u2013Computer Interaction Series","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-1-4471-6392-3_3","volume-title":"Advances in Physiological Computing","author":"P Majaranta","year":"2014","unstructured":"Majaranta, P., Bulling, A.: Eye tracking and eye-based human\u2013computer interaction. In: Fairclough, S.H., Gilleade, K. (eds.) Advances in Physiological Computing. HIS, pp. 39\u201365. Springer, London (2014). https:\/\/doi.org\/10.1007\/978-1-4471-6392-3_3"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Majaranta, P., R\u00e4ih\u00e4, K.J.: Twenty years of eye typing: systems and design issues. In: Proceedings of the 2002 Symposium on Eye Tracking Research & Applications. ETRA 2002. ACM, New York (2002). https:\/\/doi.org\/10.1145\/507072.507076. http:\/\/doi.acm.org\/10.1145\/507072.507076","DOI":"10.1145\/507072.507076"},{"key":"5_CR39","unstructured":"Rubin, P.: Review: oculus go, January 2018. https:\/\/www.wired.com\/review\/oculus-go\/. Accessed 07 Feb 2019"},{"key":"5_CR40","doi-asserted-by":"publisher","unstructured":"Scrocca, M., Ruaro, N., Occhiuto, D., Garzotto, F.: Jazzy: leveraging virtual reality layers for hand-eye coordination in users with amblyopia. In: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. CHI EA 2018. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3170427.3188618. http:\/\/doi.acm.org\/10.1145\/3170427.3188618","DOI":"10.1145\/3170427.3188618"},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Sibert, L.E., Jacob, R.J.K.: Evaluation of eye gaze interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2000. ACM, New York (2000). https:\/\/doi.org\/10.1145\/332040.332445. http:\/\/doi.acm.org\/10.1145\/332040.332445","DOI":"10.1145\/332040.332445"},{"key":"5_CR42","doi-asserted-by":"publisher","unstructured":"Sluganovic, I., Roeschlin, M., Rasmussen, K.B., Martinovic, I.: Using reflexive eye movements for fast challenge-response authentication. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS 2016. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978311. http:\/\/doi.acm.org\/10.1145\/2976749.2978311","DOI":"10.1145\/2976749.2978311"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Song, C., Wang, A., Ren, K., Xu, W.: eyeveri: a secure and usable approach for smartphone user authentication. In: IEEE International Conference on Computer Communication (INFOCOM 2016), San Francisco, California, pp. 1\u20139. April 2016","DOI":"10.1109\/INFOCOM.2016.7524367"},{"key":"5_CR44","unstructured":"Summers, N.: Microsoft\u2019s mixed reality hololens 2 headset is official, February 2019. https:\/\/www.engadget.com\/2019\/02\/24\/microsoft-hololens-2-announced\/. Accessed 28 Feb 2019"},{"key":"5_CR45","doi-asserted-by":"publisher","unstructured":"Vidal, M., Bulling, A., Gellersen, H.: Pursuits: spontaneous interaction with displays based on smooth pursuit eye movement and moving targets. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing. UbiComp 2013. ACM, New York (2013). https:\/\/doi.org\/10.1145\/2493432.2493477. http:\/\/doi.acm.org\/10.1145\/2493432.2493477","DOI":"10.1145\/2493432.2493477"},{"key":"5_CR46","doi-asserted-by":"publisher","unstructured":"Yang, J.J., Horii, H., Thayer, A., Ballagas, R.: VR grabbers: ungrounded haptic retargeting for precision grabbing tools. In: Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology. UIST 2018. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3242587.3242643. http:\/\/doi.acm.org\/10.1145\/3242587.3242643","DOI":"10.1145\/3242587.3242643"},{"key":"5_CR47","doi-asserted-by":"publisher","unstructured":"von Zezschwitz, E., De Luca, A., Brunkow, B., Hussmann, H.: Swipin: fast and secure pin-entry on smartphones. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI 2015. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2702123.2702212. http:\/\/doi.acm.org\/10.1145\/2702123.2702212","DOI":"10.1145\/2702123.2702212"},{"key":"5_CR48","doi-asserted-by":"publisher","unstructured":"von Zezschwitz, E., Dunphy, P., De Luca, A.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services. MobileHCI 2013, pp. 261\u2013270. ACM, New York (2013). https:\/\/doi.org\/10.1145\/2493190.2493231. http:\/\/doi.acm.org\/10.1145\/2493190.2493231","DOI":"10.1145\/2493190.2493231"}],"container-title":["Lecture Notes in Computer Science","Augmented Reality, Virtual Reality, and Computer Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58465-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T20:15:29Z","timestamp":1619208929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58465-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030584641","9783030584658"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58465-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AVR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Augmented Reality, Virtual Reality and Computer Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lecce","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"avr2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.salentoavr.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS - Unisalento Conferences","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"99","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}