{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:34:34Z","timestamp":1757540074513,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1228777"],"award-info":[{"award-number":["1228777"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025879","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"374-386","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Where Usability and Security Go Hand-in-Hand"],"prefix":"10.1145","author":[{"given":"Can","family":"Liu","sequence":"first","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Gradeigh D.","family":"Clark","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Janne","family":"Lindqvist","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"volume-title":"Proceedings of Graphics Interface 2013 (GI '13)","author":"Anthony Lisa","key":"e_1_3_2_2_1_1","unstructured":"Lisa Anthony , Radu-Daniel Vatavu , and Jacob O. Wobbrock . 2013. Understanding the Consistency of Users' Pen and Finger Stroke Gesture Articulation . In Proceedings of Graphics Interface 2013 (GI '13) . Canadian Information Processing Society, Toronto, Ont., Canada, Canada, 87--94. http: \/\/dl.acm.org\/citation.cfm?id=2532129.2532145 Lisa Anthony, Radu-Daniel Vatavu, and Jacob O. Wobbrock. 2013. Understanding the Consistency of Users' Pen and Finger Stroke Gesture Articulation. In Proceedings of Graphics Interface 2013 (GI '13). Canadian Information Processing Society, Toronto, Ont., Canada, Canada, 87--94. http: \/\/dl.acm.org\/citation.cfm?id=2532129.2532145"},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of Graphics Interface 2010 (GI '10)","author":"Anthony Lisa","year":"1839","unstructured":"Lisa Anthony and Jacob O. Wobbrock . 2010. A Lightweight Multistroke Recognizer for User Interface Prototypes . In Proceedings of Graphics Interface 2010 (GI '10) . Canadian Information Processing Society, Toronto, Ont., Canada, Canada, 245--252. http: \/\/dl.acm.org\/citation.cfm?id= 1839 214.1839258 Lisa Anthony and Jacob O. Wobbrock. 2010. A Lightweight Multistroke Recognizer for User Interface Prototypes. In Proceedings of Graphics Interface 2010 (GI '10). Canadian Information Processing Society, Toronto, Ont., Canada, Canada, 245--252. http: \/\/dl.acm.org\/citation.cfm?id=1839214.1839258"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663246"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628388"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.2000.878178"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2504572"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557346"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2005.06.003"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870086"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066213"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2015.6"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"volume-title":"Biometric Authentication","author":"Czyz Jacek","key":"e_1_3_2_2_15_1","unstructured":"Jacek Czyz , Mohammad Sadeghi , Josef Kittler , and Luc Vandendorpe . 2004. Decision fusion for face authentication . In Biometric Authentication . Springer , 686--693. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--540--25948-0_93 10.1007\/978--3--540--25948-0_93 Jacek Czyz, Mohammad Sadeghi, Josef Kittler, and Luc Vandendorpe. 2004. Decision fusion for face authentication. In Biometric Authentication. Springer, 686--693. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--540--25948-0_93"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208544"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903636"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001497000378"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5414322"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557043"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04)","volume":"1","author":"Hse Heloise","year":"2004","unstructured":"Heloise Hse and A. Richard Newton . 2004. Sketched Symbol Recognition Using Zernike Moments . In Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 1 Volume 01 (ICPR '04). IEEE Computer Society, Washington, DC, USA, 367--370. DOI: http:\/\/dx.doi.org\/10.1109\/ICPR. 2004 .838 10.1109\/ICPR.2004.838 Heloise Hse and A. Richard Newton. 2004. Sketched Symbol Recognition Using Zernike Moments. In Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 1 Volume 01 (ICPR '04). IEEE Computer Society, Washington, DC, USA, 367--370. DOI: http:\/\/dx.doi.org\/10.1109\/ICPR.2004.838"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055384"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-008-0118-x"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.799904"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753654"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.134"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247544"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466142"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466145"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20031078"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"volume-title":"Multi-expert Systems","author":"Rutkowska Danuta","key":"e_1_3_2_2_39_1","unstructured":"Danuta Rutkowska . 2004. Multi-expert Systems . Springer Berlin Heidelberg , Berlin, Heidelberg , 650--658. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--540--24669--5_85 10.1007\/978--3--540--24669--5_85 Danuta Rutkowska. 2004. Multi-expert Systems. Springer Berlin Heidelberg, Berlin, Heidelberg, 650--658. DOI: http:\/\/dx.doi.org\/10.1007\/978--3--540--24669--5_85"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208352"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500434"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594375"},{"key":"e_1_3_2_2_45_1","volume-title":"Proc. of NDSS '13","author":"Tian Jing","year":"2013","unstructured":"Jing Tian , Chengzhang Qu , Wenyuan Xu , and Song Wang . 2013 . KinWrite: Handwriting-Based Authentication Using Kinect . In Proc. of NDSS '13 . Jing Tian, Chengzhang Qu, Wenyuan Xu, and Song Wang. 2013. KinWrite: Handwriting-Based Authentication Using Kinect. In Proc. of NDSS '13."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2388676.2388732"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23771-3_9"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294238"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134097"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858270"},{"key":"e_1_3_2_2_54_1","unstructured":"Ziming Zhao Gail-Joon Ahn Jeong-Jin Seo and Hongxin Hu. 2013. On the Security of Picture Gesture Authentication. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX Washington D.C. 383--398. https: \/\/www.usenix.org\/conference\/usenixsecurity13\/ technical-sessions\/presentation\/zhao  Ziming Zhao Gail-Joon Ahn Jeong-Jin Seo and Hongxin Hu. 2013. On the Security of Picture Gesture Authentication. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX Washington D.C. 383--398. https: \/\/www.usenix.org\/conference\/usenixsecurity13\/ technical-sessions\/presentation\/zhao"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Denver Colorado USA","acronym":"CHI '17"},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025879","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:39Z","timestamp":1750215819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025879"}},"subtitle":["Robust Gesture-Based Authentication for Mobile Systems"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":54,"alternative-id":["10.1145\/3025453.3025879","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025879","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}