{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T04:46:40Z","timestamp":1744951600120,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/hsi.2016.7529679","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:27:58Z","timestamp":1470342478000},"page":"490-496","source":"Crossref","is-referenced-by-count":7,"title":["Heat is in the eye of the beholder: Towards better authenticating on smartglasses"],"prefix":"10.1109","author":[{"given":"Gabriela","family":"Gheorghe","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Louveton","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Viraize","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Mougin","sequence":"additional","affiliation":[]},{"given":"Sebastien","family":"Faye","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040867"},{"key":"ref31","first-page":"9","article-title":"Thermal touch: Thermography-enabled everywhere touch interfaces for mobile augmented reality applications","author":"kurz","year":"2014","journal-title":"Proc IEEE Intl Symposium on Mixed and Augmented Reality"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979317"},{"key":"ref10","article-title":"Inkblot Authentication","author":"stubblefield","year":"2004","journal-title":"Tech Rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501619"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"key":"ref13","article-title":"Kinwrite: Handwriting-based authentication using kinect","author":"tian","year":"2013","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978971"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858270"},{"key":"ref18","first-page":"837","article-title":"Are graphical authentication mechanisms as strong as passwords?","author":"renaud","year":"2013","journal-title":"2013 Federated Conference on Computer Science and Information Systems FedCSIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468497"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765944"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2015.7170668"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037442"},{"key":"ref6","first-page":"1","article-title":"The design and analysis of graphical passwords","volume":"8","author":"jermyn","year":"1999","journal-title":"Proceedings of the 8th Conference on USENIX Security Symposium"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702290"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"ref8","first-page":"4","article-title":"D&#x00E9;j&#x00E0; vu: A user study using images for authentication","volume":"9","author":"dhamija","year":"2000","journal-title":"Proceedings of the 9th conference on USENIX Security Symposium"},{"article-title":"Pass-go, a new graphical password scheme","year":"2006","author":"tao","key":"ref7"},{"key":"ref2","article-title":"A Research Agenda Acknowledging the Persistence of Passwords","author":"cormac","year":"2012","journal-title":"S&P Magazine"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIMP.2004.1434167"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1378063.1378122"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2015.7223380"},{"key":"ref25","article-title":"Eye controlled media: Present and future state","volume":"dk 2100","author":"glenstrup","year":"1995","journal-title":"IT-University of Copenhagen"}],"event":{"name":"2016 9th International Conference on Human System Interactions (HSI)","start":{"date-parts":[[2016,7,6]]},"location":"Portsmouth, United Kingdom","end":{"date-parts":[[2016,7,8]]}},"container-title":["2016 9th International Conference on Human System Interactions (HSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7523844\/7529596\/07529679.pdf?arnumber=7529679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T02:00:19Z","timestamp":1474855219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/hsi.2016.7529679","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}