{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:10Z","timestamp":1750306690642,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,26]],"date-time":"2014-04-26T00:00:00Z","timestamp":1398470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,26]]},"DOI":"10.1145\/2559206.2581157","type":"proceedings-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T14:18:30Z","timestamp":1398694710000},"page":"1585-1590","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["AirAuth"],"prefix":"10.1145","author":[{"given":"Md Tanvir Islam","family":"Aumi","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Sven","family":"Kratz","sequence":"additional","affiliation":[{"name":"FX Palo Alto Laboratory, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460920"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_18"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"e_1_3_2_2_5_1","volume-title":"ARES'10 International Conference on, IEEE","author":"Kainda R.","year":"2010","unstructured":"5 . Kainda , R. , Flechais , I. , and Roscoe , W. A . Security and usability: Analysis and evaluation. In Availability, Reliability, and Security, 2010 . ARES'10 International Conference on, IEEE ( 2010 ), 275--282. 5. Kainda, R., Flechais, I., and Roscoe, W. A. Security and usability: Analysis and evaluation. In Availability, Reliability, and Security, 2010. ARES'10 International Conference on, IEEE (2010), 275--282."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.007"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029632.1029658"},{"key":"e_1_3_2_2_9_1","first-page":"1","article-title":"What users know and what they actually do","volume":"8","author":"Riley S.","year":"2006","unstructured":"9 . Riley , S. Password security : What users know and what they actually do . Usability News 8 , 1 ( 2006 ). 9. Riley, S. Password security: What users know and what they actually do. Usability News 8, 1 (2006).","journal-title":"Usability News"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208352"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2388676.2388732"},{"key":"e_1_3_2_2_15_1","volume-title":"Human-Computer Interaction-INTERACT","author":"von Zezschwitz E.","year":"2013","unstructured":"15 . von Zezschwitz , E. , De Luca , A. , and Hussmann , H . Survival of the shortest: A retrospective analysis of influencing factors on password composition . In Human-Computer Interaction-INTERACT 2013 . Springer , 2013, 460--467. 15. von Zezschwitz, E., De Luca, A., and Hussmann, H. Survival of the shortest: A retrospective analysis of influencing factors on password composition. In Human-Computer Interaction-INTERACT 2013. Springer, 2013, 460--467."}],"event":{"name":"CHI '14: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Toronto Ontario Canada","acronym":"CHI '14"},"container-title":["CHI '14 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2559206.2581157","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2559206.2581157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:31Z","timestamp":1750230091000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2559206.2581157"}},"subtitle":["towards attack-resilient biometric authentication using in-air gestures"],"short-title":[],"issued":{"date-parts":[[2014,4,26]]},"references-count":15,"alternative-id":["10.1145\/2559206.2581157","10.1145\/2559206"],"URL":"https:\/\/doi.org\/10.1145\/2559206.2581157","relation":{},"subject":[],"published":{"date-parts":[[2014,4,26]]},"assertion":[{"value":"2014-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}