{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:31:55Z","timestamp":1742977915505,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_38","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"426-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SafetyPIN: Secure PIN Entry Through Eye Tracking"],"prefix":"10.1007","author":[{"given":"Mythreya","family":"Seetharama","sequence":"first","affiliation":[]},{"given":"Volker","family":"Paelke","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"R\u00f6cker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Roth, V., Richter, K., Freidinger, R.: A PIN-entry method resilient against shoulder surfing. In: Proceedings of the ACM conference on Computer and communications security (CCS 2004), New York pp. 236\u2013245 (2004)","DOI":"10.1145\/1030083.1030116"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), Florence, pp. 183\u2013192 (2008)","DOI":"10.1145\/1357054.1357085"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Ware, C., Mikaelian, H.: An evaluation of an eye tracker as a device for computer input. In: Proceedings of CHI 1987, Toronto (1987)","DOI":"10.1145\/29933.275627"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 13\u201319. ACM (2007)","DOI":"10.1145\/1280680.1280683"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"De Luca, A., Weiss, R., Drewes, H.: Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In: Proceedings of the 19th Australasian Conference on Computer-human Interaction: Entertaining User Interfaces, pp. 199\u2013202. ACM (2007)","DOI":"10.1145\/1324892.1324932"},{"key":"38_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-540-74800-7_43","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"H Drewes","year":"2007","unstructured":"Drewes, H., Schmidt, A.: Interacting with the computer using gaze gestures. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 475\u2013488. Springer, Heidelberg (2007)"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Drewes, H., De Luca, A., Schmidt, A.: Eye-gaze interaction for mobile phones. In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, pp. 364\u2013371. ACM (2007)","DOI":"10.1145\/1378063.1378122"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1107\u20131110. ACM (2010)","DOI":"10.1145\/1753326.1753491"},{"key":"38_CR9","unstructured":"Dunphy, P., Fitch, A., Olivier, P.: Gaze-contingent passwords at the ATM. In: 4th Conference on Communication by Gaze Interaction (COGAIN), pp. 59\u201362 (2008)"},{"key":"38_CR10","unstructured":"Tobii EyeX SDK for C\/C++, Developer\u2019s Guide. Tobii Technology (2014)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:19:25Z","timestamp":1583507965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}