{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:52:25Z","timestamp":1767084745801,"version":"3.40.5"},"reference-count":63,"publisher":"Informa UK Limited","issue":"17","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1080\/10447318.2023.2217608","type":"journal-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T08:26:50Z","timestamp":1686558410000},"page":"4608-4626","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality"],"prefix":"10.1080","volume":"40","author":[{"given":"Jiawei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China"},{"name":"Key Laboratory of Data Security and Privacy Preserving, College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8523-2828","authenticated-orcid":false,"given":"BoYu","family":"Gao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Security and Privacy Preserving, College of Cyber Security, Jinan University, Guangzhou, China"},{"name":"Guangdong Institute of Smart Education, Jinan University, Guangzhou, China"}]},{"given":"Huawei","family":"Tu","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Information Technology, La Trobe University, Melbourne, Australia"}]},{"given":"Hai-Ning","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Computing, Xi\u2019an Jiaotong-Liverpool University, Suzhou, China"}]},{"given":"Zitao","family":"Liu","sequence":"additional","affiliation":[{"name":"Guangdong Institute of Smart Education, Jinan University, Guangzhou, China"},{"name":"TAL Education Group, Beijing, China"}]},{"given":"Weiqi","family":"Luo","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Security and Privacy Preserving, College of Cyber Security, Jinan University, Guangzhou, China"},{"name":"Guangdong Institute of Smart Education, Jinan University, Guangzhou, China"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Security and Privacy Preserving, College of Cyber Security, Jinan University, Guangzhou, China"}]}],"member":"301","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531092"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR46125.2019.00012"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/virtualworlds1010004"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.5120\/20299-2332"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304919"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907942"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594373"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312959"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58465-8_5"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8797862"},{"key":"e_1_3_3_13_1","volume-title":"Network and Distributed System Security Symposium (NDSS 2017)","author":"George C.","year":"2017","unstructured":"George, C., Khamis, M., von Zezschwitz, E., Burger, M., Schmidt, H., Alt, F., & Hussmann, H. (2017). Seamless and secure VR: Adapting and evaluating established authentication systems for virtual reality [Paper Presentation]. Network and Distributed System Security Symposium (NDSS 2017), San Diego, California, USA"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543042003237"},{"key":"e_1_3_3_15_1","volume-title":"Virtual reality technology","author":"Grigore C. B.","year":"2003","unstructured":"Grigore, C. B., & Philippe, C. (2003). Virtual reality technology. John Wiley & Sons."},{"key":"e_1_3_3_16_1","unstructured":"Group U. C. F. R. E. (n.d). Bigscreen and unity virtual reality attacks and the man in the room attack. https:\/\/www.scmagazine.com\/news\/content\/critical-vulnerabilities-in-bigscreen-vr-app-unity-allow-eavesdropping-man-in-the-room-attacks"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313076"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.3102\/10769986017004315"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979326"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.5169\/seals-268384"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_16"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206505.3206522"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE\/EUC.2019.00031"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00208"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24079"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761849"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382799"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00048"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531087"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464327.3464329"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445478"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00049"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382827"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428121"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2697179"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-74486-y"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR46125.2019.00058"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00070"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00035"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00060"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00076"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CoG52621.2021.9619145"},{"issue":"1","key":"e_1_3_3_45_1","first-page":"51","article-title":"Body identification, biometrics and medicine: Ethical and social considerations","volume":"43","author":"Mordini E.","year":"2007","unstructured":"Mordini, E., & Ottolini, C. (2007). Body identification, biometrics and medicine: Ethical and social considerations. Annali-Istituto Superiore di Sanita, 43(1), 51.","journal-title":"Annali-Istituto Superiore di Sanita,"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20102944"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385378.3385385"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517031.3531631"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_3_53_1","doi-asserted-by":"crossref","unstructured":"Sanderson S. & Erbetta J. (2000). Authentication for secure environments based on iris scanning technology. In Proceeding of the IEEE Colloquium on Visual Biometrics. IEEE.","DOI":"10.1049\/ic:20000468"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2800048"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_3_56_1","first-page":"243","volume-title":"Proceeding of the 10th symposium on usable privacy and security (SOUPS'14)","author":"Stobert E.","year":"2014","unstructured":"Stobert, E., & Biddle, R. (2014). The password life cycle: User behaviour in managing passwords. In Proceeding of the 10th symposium on usable privacy and security (SOUPS'14) (pp. 243\u2013255). ACM."},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351262"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2539942"},{"key":"e_1_3_3_59_1","unstructured":"UNHcFREG. (2019). Man-in-the-room attack & command and control server proof of concept. https:\/\/www.youtube.com\/watch?v=N_Z3mfzLZME."},{"key":"e_1_3_3_60_1","unstructured":"Wang J. (2021). Multi-attribute-user-authentication. GitHub. https:\/\/github.com\/JiaweiWang-AdrianA\/Multi-attribute-User-Authentication."},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78642-7_61"},{"key":"e_1_3_3_62_1","first-page":"19","volume-title":"Proceedings of the Biometric Consortium Conference","author":"Watanabe M.","year":"2005","unstructured":"Watanabe, M., Endoh, T., Shiohara, M., Sasaki, S. (2005). Palm vein authentication technology and its applications. In Proceedings of the Biometric Consortium Conference (pp. 19\u201321)."},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7804002"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032623"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2023.2217608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T09:07:24Z","timestamp":1725008844000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2023.2217608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":63,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["10.1080\/10447318.2023.2217608"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2023.2217608","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-17","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}