{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:38:54Z","timestamp":1742960334526,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030856090"},{"type":"electronic","value":"9783030856106"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85610-6_41","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"712-721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones"],"prefix":"10.1007","author":[{"given":"Yasmeen","family":"Abdrabou","sequence":"first","affiliation":[]},{"given":"Reem","family":"Hatem","sequence":"additional","affiliation":[]},{"given":"Yomna","family":"Abdelrahman","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Elmougy","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"41_CR1","unstructured":"Affordable thermal camera on amazon. https:\/\/www.amazon.co.uk\/dp\/B07CMDCZGV\/. Accessed 13 Apr 2021"},{"key":"41_CR2","unstructured":"Flir c2 (2021). http:\/\/www.flir.eu\/instruments\/c2\/. Accessed 13 Apr 2021"},{"key":"41_CR3","unstructured":"Make me a password. (2021). https:\/\/makemeapassword.ligos.net\/. Accessed 13 Apr 2021"},{"key":"41_CR4","unstructured":"Online password generator (2021). https:\/\/passwordsgenerator.net. Accessed 13 Apr 2021"},{"key":"41_CR5","unstructured":"Rootdomains (2021). https:\/\/moz.com\/learn\/seo\/domain. Accessed 13 Apr 2021"},{"key":"41_CR6","unstructured":"Top 50 most visited websites (2021). https:\/\/www.alexa.com\/topsites. Accessed 13 Apr 2021"},{"key":"41_CR7","doi-asserted-by":"publisher","unstructured":"Abdelrahman, Y., Khamis, M., Schneegass, S., Alt, F.: Stay cool! understanding thermal attacks on mobile-based user authentication, pp. 3751\u20133763. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3025453.3025461","DOI":"10.1145\/3025453.3025461"},{"key":"41_CR8","doi-asserted-by":"publisher","unstructured":"Abdrabou, Y., Abdelrahman, Y., Ayman, A., Elmougy, A., Khamis, M.: Are thermal attacks ubiquitous? When non-expert attackers use off the shelf thermal cameras. In: Proceedings of the International Conference on Advanced Visual Interfaces. AVI 2020, Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3399715.3399819","DOI":"10.1145\/3399715.3399819"},{"key":"41_CR9","doi-asserted-by":"publisher","unstructured":"De Luca, A., von Zezschwitz, E., Pichler, L., Hussmann, H.: Using fake cursors to secure on-screen password entry, pp. 2399\u20132402. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2470654.2481331","DOI":"10.1145\/2470654.2481331"},{"key":"41_CR10","doi-asserted-by":"publisher","unstructured":"Eiband, M., Khamis, M., von Zezschwitz, E., Hussmann, H., Alt, F.: Understanding shoulder surfing in the wild: stories from users and observers, pp. 4254\u20134265. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3025453.3025636","DOI":"10.1145\/3025453.3025636"},{"key":"41_CR11","doi-asserted-by":"publisher","unstructured":"George, C., Khamis, M., Buschek, D., Hussmann, H.: Investigating the third dimension for authentication in immersive virtual reality and in the real world. In: 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), pp. 277\u2013285 (2019). https:\/\/doi.org\/10.1109\/VR.2019.8797862","DOI":"10.1109\/VR.2019.8797862"},{"key":"41_CR12","doi-asserted-by":"publisher","unstructured":"Kaczmarek, T., Ozturk, E., Tsudik, G.: Thermanator: thermal residue-based post factum attacks on keyboard data entry. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 586\u2013593. Asia CCS 2019, Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3321705.3329846","DOI":"10.1145\/3321705.3329846"},{"key":"41_CR13","doi-asserted-by":"publisher","unstructured":"Katsini, C., Abdrabou, Y., Raptis, G.E., Khamis, M., Alt, F.: The role of eye gaze in security and privacy applications: survey and future hci research directions. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201321. CHI 2020, Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376840","DOI":"10.1145\/3313831.3376840"},{"key":"41_CR14","doi-asserted-by":"publisher","unstructured":"Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: Gazetouchpass: multimodal authentication using gaze and touch on mobile devices. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2156\u20132164. CHI EA 2016, Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2851581.2892314","DOI":"10.1145\/2851581.2892314"},{"key":"41_CR15","doi-asserted-by":"publisher","unstructured":"Mathis, F., Williamson, J.H., Vaniea, K., Khamis, M.: Fast and secure authentication in virtual reality using coordinated 3D manipulation and pointing. ACM Trans. Comput.-Hum. Interact. 28(1) (2021). https:\/\/doi.org\/10.1145\/3428121","DOI":"10.1145\/3428121"},{"key":"41_CR16","unstructured":"Mowery, K., Meiklejohn, S., Savage, S.: In: Heat of the moment: characterizing the efficacy of thermal camera-based attacks, p. 6. WOOT 2011. USENIX Association, USA (2011)"},{"key":"41_CR17","doi-asserted-by":"publisher","unstructured":"Navarro, G.: A guided tour to approximate string matching. ACM Comput. Surv. 33(1), 31\u201388 (2001). https:\/\/doi.org\/10.1145\/375360.375365","DOI":"10.1145\/375360.375365"},{"issue":"1","key":"41_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/0167-4048(82)90025-6","volume":"1","author":"SN Porter","year":"1982","unstructured":"Porter, S.N.: A password extension for improved human factors. Comput. Secur. 1(1), 54\u201356 (1982)","journal-title":"Comput. Secur."},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Wodo, W., Hanzlik, L.: Thermal imaging attacks on keypad security systems. In: SECRYPT, pp. 458\u2013464 (2016)","DOI":"10.5220\/0005998404580464"},{"key":"41_CR20","unstructured":"Zalewski, M.: Cracking safes with thermal imaging. ser (2005). http:\/\/lcamtuf.coredump.cx\/tsafe"},{"key":"41_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/978-3-642-40477-1_28","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"E von Zezschwitz","year":"2013","unstructured":"von Zezschwitz, E., De Luca, A., Hussmann, H.: Survival of the shortest: a retrospective analysis of influencing factors on password composition. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013. LNCS, vol. 8119, pp. 460\u2013467. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40477-1_28"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85610-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T22:16:44Z","timestamp":1638569804000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85610-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856090","9783030856106"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85610-6_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}