{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T23:07:23Z","timestamp":1778281643619,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,18]],"date-time":"2015-04-18T00:00:00Z","timestamp":1429315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["SFB\/TRR 62"],"award-info":[{"award-number":["SFB\/TRR 62"]}]},{"name":"German Research Foundation (DFG) -- Emmy Noether","award":["Mob. Interaction with Pervasive UI"],"award-info":[{"award-number":["Mob. Interaction with Pervasive UI"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,18]]},"DOI":"10.1145\/2702123.2702316","type":"proceedings-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T22:11:35Z","timestamp":1429308695000},"page":"1407-1410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Glass Unlock"],"prefix":"10.1145","author":[{"given":"Christian","family":"Winkler","sequence":"first","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Jan","family":"Gugenheimer","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Alexander","family":"De Luca","sequence":"additional","affiliation":[{"name":"University of Munich &amp; DFKI GmbH, Munich, Germany"}]},{"given":"Gabriel","family":"Haas","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Philipp","family":"Speidel","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"David","family":"Dobbelstein","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Enrico","family":"Rukzio","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,4,18]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. WOOT '10","author":"Aviv A. J.","year":"2010","unstructured":"Aviv , A. J. , Gibson , K. , Mossop , E. , Blaze , M. , and Smith , J. M . Smudge attacks on smartphone touch screens . In Proc. WOOT '10 , USENIX Association ( 2010 ), 1--7. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In Proc. WOOT '10, USENIX Association (2010), 1--7."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557346"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642639"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_3_2_2_7_1","volume-title":"Proc. SOUPS '14","author":"Harbach M.","year":"2014","unstructured":"Harbach , M. , von Zezschwitz , E. , Fichtner , A. , De Luca , A. , and Smith , M . It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception . In Proc. SOUPS '14 , USENIX Association ( July 2014 ), 213--230. Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., and Smith, M. It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Proc. SOUPS '14, USENIX Association (July 2014), 213--230."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414584"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968647"}],"event":{"name":"CHI '15: CHI Conference on Human Factors in Computing Systems","location":"Seoul Republic of Korea","acronym":"CHI '15","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2702123.2702316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2702123.2702316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:50Z","timestamp":1750227410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2702123.2702316"}},"subtitle":["Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display"],"short-title":[],"issued":{"date-parts":[[2015,4,18]]},"references-count":9,"alternative-id":["10.1145\/2702123.2702316","10.1145\/2702123"],"URL":"https:\/\/doi.org\/10.1145\/2702123.2702316","relation":{},"subject":[],"published":{"date-parts":[[2015,4,18]]},"assertion":[{"value":"2015-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}