{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:54:03Z","timestamp":1776120843453,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031547751","type":"print"},{"value":"9783031547768","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54776-8_16","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T07:02:36Z","timestamp":1709103756000},"page":"412-431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Usable Authentication in\u00a0Virtual Reality: Exploring the\u00a0Usability of\u00a0PINs and\u00a0Gestures"],"prefix":"10.1007","author":[{"given":"H. T. M. A.","family":"Riyadh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Divyanshu","family":"Bhardwaj","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abdelrahman, Y., Khamis, M., Schneegass, S., Alt, F.: Stay cool! Understanding thermal attacks on mobile-based user authentication. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751\u20133763 (2017)","DOI":"10.1145\/3025453.3025461"},{"key":"16_CR2","unstructured":"Alsop, T.: VR device shipments by vendor worldwide 2017\u20132019 (2022). https:\/\/www.statista.com\/statistics\/671403\/global-virtual-reality-device-shipments-by-vendor\/"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Alsulaiman, F.A., El Saddik, A.: A novel 3D graphical password schema. In: 2006 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems, pp. 125\u2013128. IEEE (2006)","DOI":"10.1109\/VECIMS.2006.250805"},{"key":"16_CR4","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: 4th USENIX Workshop on Offensive Technologies (WOOT 10) (2010)"},{"key":"16_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101728","volume":"65","author":"C Ball","year":"2021","unstructured":"Ball, C., Huang, K.T., Francis, J.: Virtual reality adoption during the COVID-19 pandemic: a uses and gratifications perspective. Telematics Inform. 65, 101728 (2021)","journal-title":"Telematics Inform."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Ballagas, R., Rohs, M., Sheridan, J.G.: Sweep and point and shoot: phonecam-based interactions for large public displays. In: CHI 2005 Extended Abstracts on Human Factors in Computing Systems, pp. 1200\u20131203 (2005)","DOI":"10.1145\/1056808.1056876"},{"issue":"3","key":"16_CR7","first-page":"114","volume":"4","author":"A Bangor","year":"2009","unstructured":"Bangor, A., Kortum, P., Miller, J.: Determining what individual SUS scores mean: adding an adjective rating scale. J. Usability Stud. 4(3), 114\u2013123 (2009)","journal-title":"J. Usability Stud."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Bi, X., Li, Y., Zhai, S.: FFitts law: modeling finger touch with fitts\u2019 law, pp. 1363\u20131372 (2013)","DOI":"10.1145\/2470654.2466180"},{"issue":"194","key":"16_CR9","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J., et al.: SUS-a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4\u20137 (1996)","journal-title":"Usability Eval. Ind."},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.patcog.2014.02.017","volume":"48","author":"V Cantoni","year":"2015","unstructured":"Cantoni, V., Galdi, C., Nappi, M., Porta, M., Riccio, D.: Gant: Gaze analysis technique for human identification. Pattern Recogn. 48(4), 1027\u20131038 (2015)","journal-title":"Pattern Recogn."},{"issue":"4","key":"16_CR12","first-page":"7","volume":"54","author":"IM Craddock","year":"2018","unstructured":"Craddock, I.M.: Immersive virtual reality, google expeditions, and English language learning. Libr. Technol. Rep. 54(4), 7\u20139 (2018)","journal-title":"Libr. Technol. Rep."},{"key":"16_CR13","unstructured":"Doronichev, A.: Daydream labs: exploring and sharing VR\u2019s possibilities. Retrieved 10 April 2020 (2016)"},{"key":"16_CR14","unstructured":"Earnshaw, R.A.: Virtual Reality Systems. Academic Press (2014)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"George, C., et al.: Seamless and secure VR: Adapting and evaluating established authentication systems for virtual reality (2017)","DOI":"10.14722\/usec.2017.23028"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Hale, K.S., Stanney, K.M.: Handbook of Virtual Environments: Design, Implementation, and Applications. CRC Press (2014)","DOI":"10.1201\/b17360"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/TPAMI.2009.30","volume":"32","author":"DW Hansen","year":"2009","unstructured":"Hansen, D.W., Ji, Q.: In the eye of the beholder: a survey of models for eyes and gaze. IEEE Trans. Pattern Anal. Mach. Intell. 32(3), 478\u2013500 (2009)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Jacob, R.J., et al.: Reality-based interaction: a framework for post-wimp interfaces, pp. 201\u2013210 (2008)","DOI":"10.1145\/1357054.1357089"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: GazeTouchPass: multimodal authentication using gaze and touch on mobile devices. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2156\u20132164 (2016)","DOI":"10.1145\/2851581.2892314"},{"key":"16_CR20","unstructured":"Krombholz, K., Dabrowski, A., Weippl, E.: Poster: The petri dish attack-guessing secrets based on bacterial growth (2018)"},{"key":"16_CR21","unstructured":"Krombholz, K., Hupperich, T., Holz, T.: Use the force: evaluating $$\\{$$Force-Sensitive$$\\}$$ authentication for mobile devices. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 207\u2013219 (2016)"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-030-05710-7_5","volume-title":"MultiMedia Modeling","author":"A Kupin","year":"2019","unstructured":"Kupin, A., Moeller, B., Jiang, Y., Banerjee, N.K., Banerjee, S.: Task-driven biometric authentication of users in virtual reality (VR) environments. In: Kompatsiaris, I., Huet, B., Mezaris, V., Gurrin, C., Cheng, W.-H., Vrochidis, S. (eds.) MMM 2019. LNCS, vol. 11295, pp. 55\u201367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05710-7_5"},{"issue":"11","key":"16_CR23","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"16_CR24","unstructured":"Laricchia, F.: UK: VR headset owners by age 2023 (2023). https:\/\/www.statista.com\/statistics\/1362661\/share-of-vr-headset-owners-by-age-uk\/"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Liebers, J., et al.: Understanding user identification in virtual reality through behavioral biometrics and the effect of body normalization. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. pp. 1\u201311 (2021)","DOI":"10.1145\/3411764.3445528"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Lin, F., Cho, K.W., Song, C., Xu, W., Jin, Z.: Brain password: a secure and truly cancelable brain biometrics for smart headwear. In: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, pp. 296\u2013309 (2018)","DOI":"10.1145\/3210240.3210344"},{"key":"16_CR27","unstructured":"Lu, D., Lee, T., Das, S., Hong, J.I.: Examining visual-spatial paths for mobile authentication. In: WAY@ SOUPS (2016)"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., Yan, Z.: OcuLock: exploring human visual system for authentication in virtual reality head-mounted display. In: 2020 Network and Distributed System Security Symposium (NDSS) (2020)","DOI":"10.14722\/ndss.2020.24079"},{"key":"16_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30634-6","volume-title":"Introduction to Nonparametric Statistics for the Biological Sciences Using R","author":"TWW MacFarland","year":"2016","unstructured":"MacFarland, T.W.W., Yates, J.M.M.: Introduction to Nonparametric Statistics for the Biological Sciences Using R. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30634-6"},{"issue":"1","key":"16_CR30","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/38.250913","volume":"14","author":"C Machover","year":"1994","unstructured":"Machover, C., Tice, S.E.: Virtual reality. IEEE Comput. Graphics Appl. 14(1), 15\u201316 (1994)","journal-title":"IEEE Comput. Graphics Appl."},{"key":"16_CR31","unstructured":"Maguire, J., Renaud, K.: You only live twice or the years we wasted caring about shoulder-surfing (2015). arXiv preprint arXiv:1508.05626"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Mathis, F., Fawaz, H.I., Khamis, M.: Knowledge-driven biometric authentication in virtual reality. In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201310 (2020)","DOI":"10.1145\/3334480.3382799"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Miller, R., Ajit, A., Banerjee, N.K., Banerjee, S.: Realtime behavior-based continual authentication of users in virtual reality environments. In: 2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR), pp. 253\u20132531. IEEE (2019)","DOI":"10.1109\/AIVR46125.2019.00058"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Mustafa, T., Matovu, R., Serwadda, A., Muirhead, N.: Unsure how to authenticate on your VR headset? Come on, use your head! In: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, pp. 23\u201330 (2018)","DOI":"10.1145\/3180445.3180450"},{"issue":"12","key":"16_CR35","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1016\/j.ijhcs.2011.07.004","volume":"69","author":"T Partala","year":"2011","unstructured":"Partala, T.: Psychological needs and virtual worlds: case second life. Int. J. Hum Comput Stud. 69(12), 787\u2013800 (2011)","journal-title":"Int. J. Hum Comput Stud."},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Peres, S.C., Pham, T., Phillips, R.: Validation of the system usability scale (SUS) SUS in the wild. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting. vol. 57, pp. 192\u2013196. SAGE Publications Sage CA: Los Angeles, CA (2013)","DOI":"10.1177\/1541931213571043"},{"key":"16_CR37","unstructured":"Petrock, V.: Us virtual and augmented reality users 2020 (2020). https:\/\/www.insiderintelligence.com\/content\/us-virtual-and-augmented-reality-users-2020"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Pfeuffer, K., Geiger, M.J., Prange, S., Mecke, L., Buschek, D., Alt, F.: Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312 (2019)","DOI":"10.1145\/3290605.3300340"},{"key":"16_CR39","unstructured":"Phelan, D.: Google daydream VR review: comfy, capable and affordable but not enough content yet (2016). https:\/\/www.independent.co.uk\/tech\/google-daydream-view-vr-review-virtual-reality-pixel-xl-headset-is-it-worth-it-a7444226.html"},{"key":"16_CR40","unstructured":"Rauschnabel, P.A., Brem, A., Ro, Y.: Augmented reality smart glasses: definition, conceptual insights, and managerial importance. Unpublished Working Paper, The University of Michigan-Dearborn, College of Business (2015)"},{"issue":"6","key":"16_CR41","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1016\/j.patrec.2012.01.003","volume":"33","author":"I Rigas","year":"2012","unstructured":"Rigas, I., Economou, G., Fotopoulos, S.: Biometric identification based on the eye movements and graph matching techniques. Pattern Recogn. Lett. 33(6), 786\u2013792 (2012)","journal-title":"Pattern Recogn. Lett."},{"key":"16_CR42","unstructured":"Sergei Vardomatski: Council post: Augmented and virtual reality after COVID-19 (2021). Accessed 4 Nov 2022"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Sivasamy, M., Sastry, V., Gopalan, N.: VRCAuth: continuous authentication of users in virtual reality environment using head-movement. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 518\u2013523. IEEE (2020)","DOI":"10.1109\/ICCES48766.2020.9137914"},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Sluganovic, I., Roeschlin, M., Rasmussen, K.B., Martinovic, I.: Using reflexive eye movements for fast challenge-response authentication. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1056\u20131067 (2016)","DOI":"10.1145\/2976749.2978311"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Vatavu, R.D., Anthony, L., Wobbrock, J.O.: Gestures as point clouds: a \\$ p recognizer for user interface prototypes. In: Proceedings of the 14th ACM International Conference on Multimodal Interaction, pp. 273\u2013280 (2012)","DOI":"10.1145\/2388676.2388732"},{"key":"16_CR46","doi-asserted-by":"crossref","unstructured":"Von Zezschwitz, E., Dunphy, P., De Luca, A.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, pp. 261\u2013270 (2013)","DOI":"10.1145\/2493190.2493231"},{"key":"16_CR47","doi-asserted-by":"publisher","unstructured":"Wilcoxon, F.: Individual Comparisons by Ranking Methods. In: Kotz, S., Johnson, N.L. (eds.) Breakthroughs in Statistics. Springer Series in Statistics. Springer, New York, NY (1992). https:\/\/doi.org\/10.1007\/978-1-4612-4380-9_16","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Yu, Z., Liang, H.N., Fleming, C., Man, K.L.: An exploration of usable authentication mechanisms for virtual reality systems. In: 2016 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), pp. 458\u2013460. IEEE (2016)","DOI":"10.1109\/APCCAS.2016.7804002"},{"issue":"4","key":"16_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3432217","volume":"4","author":"H Zhu","year":"2020","unstructured":"Zhu, H., Jin, W., Xiao, M., Murali, S., Li, M.: BlinKey: a two-factor user authentication method for virtual reality devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4), 1\u201329 (2020)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54776-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:18:00Z","timestamp":1709655480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54776-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547751","9783031547768"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54776-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}