{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:09Z","timestamp":1750307049067,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,5,5]],"date-time":"2012-05-05T00:00:00Z","timestamp":1336176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,5]]},"DOI":"10.1145\/2207676.2208352","type":"proceedings-article","created":{"date-parts":[[2012,5,7]],"date-time":"2012-05-07T18:47:53Z","timestamp":1336416473000},"page":"2045-2048","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks"],"prefix":"10.1145","author":[{"given":"Alireza","family":"Sahami Shirazi","sequence":"first","affiliation":[{"name":"University of Stuttgart, Stuttgart, Germany"}]},{"given":"Peyman","family":"Moghadam","sequence":"additional","affiliation":[{"name":"Autonomous Systems Laboratory, CSIRO ICT Centre, Brisbane, Australia"}]},{"given":"Hamed","family":"Ketabdar","sequence":"additional","affiliation":[{"name":"Quality and Usability Lab, Deutsche Telekom Laboratories &amp; TU Berlin, Berlin, Germany"}]},{"given":"Albrecht","family":"Schmidt","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449715.1449746"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0006-6"},{"key":"e_1_3_2_1_4_1","volume-title":"Washington","author":"DoD. Department of Defense Password Management Guideline.","year":"1985","unstructured":"DoD. Department of Defense Password Management Guideline. Washington , DC : National Computer Security Center , CSC-STD-002--85, 1985 . DoD. Department of Defense Password Management Guideline. Washington, DC: National Computer Security Center, CSC-STD-002--85, 1985."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_7_1","first-page":"155","volume-title":"SHAKE - Sensor Hardware Accessory for Kinesthetic Expression. Proc. of Enactive'06","author":"Hughes S.","unstructured":"Hughes S. and O'Modhrain S.. SHAKE - Sensor Hardware Accessory for Kinesthetic Expression. Proc. of Enactive'06 , pages 155 . Hughes S. and O'Modhrain S.. SHAKE - Sensor Hardware Accessory for Kinesthetic Expression. Proc. of Enactive'06, pages 155."},{"volume-title":"Proc. Of UBICOMM'10","author":"Ketabdar H.","key":"e_1_3_2_1_8_1","unstructured":"Ketabdar , H. , Y\u00fcksel , K.A. , Jahnbekam , A. , Roshandel , M. , and Skripko , D . MagiSign: User Identification\/Authentication . Proc. Of UBICOMM'10 . Ketabdar, H., Y\u00fcksel, K.A., Jahnbekam, A., Roshandel, M., and Skripko, D. MagiSign: User Identification\/Authentication. Proc. Of UBICOMM'10."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the 2nd USENIX Security Workshop","author":"Klein D.V.","year":"1990","unstructured":"Klein , D.V. Foiling the cracker: A survey of, and improvements to, password security . Proc. of the 2nd USENIX Security Workshop , ( 1990 ), 5--14. Klein, D.V. Foiling the cracker: A survey of, and improvements to, password security. Proc. of the 2nd USENIX Security Workshop, (1990), 5--14."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1613858.1613864"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_12_1","first-page":"2627","article-title":"Attacks and solutions on strong-password authentication","volume":"2622","author":"Lin C.L.","year":"2001","unstructured":"Lin , C.L. , Sun , H.M. , and Hwang , T . Attacks and solutions on strong-password authentication . IEICE Transactions on Communications , 2001 , 2622 -- 2627 . Lin, C.L., Sun, H.M., and Hwang, T. Attacks and solutions on strong-password authentication. IEICE Transactions on Communications, 2001, 2622--2627.","journal-title":"IEICE Transactions on Communications"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"volume-title":"ISCAS'08","author":"Qibin Sun","key":"e_1_3_2_1_14_1","unstructured":"Qibin Sun , Zhi Li, Xudong Jiang , and Kot, A . An interactive and secure user authentication scheme for mobile devices . ISCAS'08 , 2973--2976. Qibin Sun, Zhi Li, Xudong Jiang, and Kot, A. An interactive and secure user authentication scheme for mobile devices. ISCAS'08, 2973--2976."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"volume-title":"Proc. Of MobileHCI'03","author":"Takada T.","key":"e_1_3_2_1_16_1","unstructured":"Takada , T. and Koike , H . Awase-E: Image-based authentication for mobile phones using user's favorite images . Proc. Of MobileHCI'03 , 347--351. Takada, T. and Koike, H. Awase-E: Image-based authentication for mobile phones using user's favorite images. Proc. Of MobileHCI'03, 347--351."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of ASCI","author":"Ten Holt G.","year":"2007","unstructured":"Ten Holt , G. , Multi-dimensional dynamic time warping for gesture recognition . Proc. of ASCI 2007 . Ten Holt, G., et al..Multi-dimensional dynamic time warping for gesture recognition. Proc. of ASCI 2007."}],"event":{"name":"CHI '12: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Austin Texas USA","acronym":"CHI '12"},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2208352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2207676.2208352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:04Z","timestamp":1750238464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2208352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,5]]},"references-count":18,"alternative-id":["10.1145\/2207676.2208352","10.1145\/2207676"],"URL":"https:\/\/doi.org\/10.1145\/2207676.2208352","relation":{},"subject":[],"published":{"date-parts":[[2012,5,5]]},"assertion":[{"value":"2012-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}