{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:47:19Z","timestamp":1725673639512},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/percomw.2018.8480087","type":"proceedings-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T23:49:51Z","timestamp":1539042591000},"page":"336-341","source":"Crossref","is-referenced-by-count":0,"title":["User Authentication based on Personal Image Experiences"],"prefix":"10.1109","author":[{"given":"Ngu","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/1518701.1518837","article-title":"A comprehensive study of frequency, interference, and training of multiple graphical passwords","author":"everitt","year":"2009","journal-title":"SIGCHI conference on Human Factors in Computing Systems"},{"key":"ref11","article-title":"An egocentric look at video photographer identity","author":"hoshen","year":"2016","journal-title":"IEEE International Conference on Computer Vision and Pattern Recognition"},{"key":"ref12","first-page":"145","article-title":"What makes an image memorable?","author":"isola","year":"2011","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/2858036.2858417","article-title":"Enhancing lifelogging privacy by detecting screens","author":"korayem","year":"2016","journal-title":"ACM CHI Conference on Human Factors in Computing Systems (CHI)"},{"key":"ref14","article-title":"Whose move is it anyway? authenticating smart wearable devices using unique head movement patterns","author":"li","year":"2016","journal-title":"IEEE Conference on Pervasive Computing and Communications (PerCom)"},{"key":"ref15","first-page":"40:1","article-title":"Privacy-protecting smart cameras","author":"rinner","year":"2014","journal-title":"Proceedings of International Conference on Distributed Smart Cameras ICDSC"},{"key":"ref16","article-title":"Fusing points and lines for high performance tracking","author":"rosten","year":"2005","journal-title":"IEEE International Conference on Computer Vision"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/2785830.2785880","article-title":"Passapp: My app is my password!","author":"sun","year":"2015","journal-title":"International Conference on Human-Computer Interaction with Mobile Devices and Services"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.84"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/1282280.1282340","article-title":"Representing shape with a spatial pyramid kernel","author":"bosch","year":"2007","journal-title":"ACM International Conference on Image and Video Retrieval"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.226"},{"key":"ref6","article-title":"Exploring capturable everyday memory for autobiographical authentication","author":"das","year":"2013","journal-title":"ACM International Joint Conference on Pervasive and Ubiquitous Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808398"},{"key":"ref8","article-title":"Indoor tracking using crowdsourced maps","author":"dong","year":"2016","journal-title":"2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)IEEE"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2615","DOI":"10.1145\/1978942.1979323","article-title":"Exploring implicit memory for painless password recovery","author":"denning","year":"2011","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref2","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"Proc of USENIX Conf on Offensive Technologies"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.22"},{"key":"ref9","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"ACM SIGKDD Conference on Knowledge Discovery and Data Mining"},{"key":"ref20","article-title":"Centrist: A visual descriptor for scene categorization","author":"wu","year":"2011","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref21","first-page":"187","author":"yonetani","year":"2016","journal-title":"Visual Motif Discovery via First-Person Vision"}],"event":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2018,3,19]]},"location":"Athens","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8454955\/8480085\/08480087.pdf?arnumber=8480087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T19:43:11Z","timestamp":1693942991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8480087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/percomw.2018.8480087","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}