{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:32Z","timestamp":1750308572722,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"General Secretariat for Research and Technology (GSRT) and the Hellenic Foundation for Research and Innovation (H.F.R.I.)","award":["617"],"award-info":[{"award-number":["617"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6,14]]},"DOI":"10.1145\/3204493.3204589","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T13:57:46Z","timestamp":1528379866000},"page":"1-5","source":"Crossref","is-referenced-by-count":13,"title":["Towards gaze-based quantification of the security of graphical authentication schemes"],"prefix":"10.1145","author":[{"given":"Christina","family":"Katsini","sequence":"first","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"George E.","family":"Raptis","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Nikolaos","family":"Avouris","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857491.2857527"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Robert Biddle Sonia Chiasson and Paul C. Van Oorschot. 2012. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys (CSUR) 44 4 Article 19 (Sept. 2012) 41 pages. 10.1145\/2333112.2333114   Robert Biddle Sonia Chiasson and Paul C. Van Oorschot. 2012. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys (CSUR) 44 4 Article 19 (Sept. 2012) 41 pages. 10.1145\/2333112.2333114","DOI":"10.1145\/2333112.2333114"},{"volume-title":"People and Computers XIV --- Usability or Else!","author":"Brostoff Sacha","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"volume-title":"Computer Security - ESORICS","year":"2007","author":"Chiasson Sonia","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Deja Vu-A User Study: Using Images for Authentication. In USENIX Security Symposium","volume":"9","author":"Dhamija Rachna","year":"2000"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857491.2857519"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970818"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117309.1117319"},{"volume-title":"The Interface of Language, Vision, and Action: Eye Movements and the Visual World, John M","author":"Irwin David E.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003733.3003764"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172996"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834121"},{"volume-title":"ImagePass - Designing Graphical Authentication for Security. In 7th International Conference on Next Generation Web Services Practices. 262--267","year":"2011","author":"Mihajlov Martin","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382307"},{"key":"e_1_3_2_1_20_1","unstructured":"Philip K. Oltman Evelyn Raskin and Herman A. Witkin. 1971. Group Embedded Figures Test. Consulting Psychologists Press Palo Alto CA.  Philip K. Oltman Evelyn Raskin and Herman A. Witkin. 1971. Group Embedded Figures Test. Consulting Psychologists Press Palo Alto CA."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.02.003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738916"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.18"},{"key":"e_1_3_2_1_25_1","unstructured":"Steven Sinofsky. 2011. Signing in with a Picture Password. (dec 2011). https:\/\/blogs.msdn.microsoft.com\/b8\/2011\/12\/16\/signing-in-with-a-picture-password\/  Steven Sinofsky. 2011. Signing in with a Picture Password. (dec 2011). https:\/\/blogs.msdn.microsoft.com\/b8\/2011\/12\/16\/signing-in-with-a-picture-password\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920273"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557212"},{"volume-title":"The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security 12)","year":"2012","author":"Ur Blase","key":"e_1_3_2_1_29_1"},{"volume-title":"Proceedings of the XXVII Annual Conference of the Cognitive Science Society (CogSci","year":"2005","author":"Velichkovsky Boris M.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701423"}],"event":{"name":"ETRA '18: 2018 Symposium on Eye Tracking Research and Applications","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Warsaw Poland","acronym":"ETRA '18"},"container-title":["Proceedings of the 2018 ACM Symposium on Eye Tracking Research &amp; Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204493.3204589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3204589&ftid=1978708&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:31Z","timestamp":1750273471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204493.3204589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":32,"alternative-id":["10.1145\/3204493.3204589","10.1145\/3204493"],"URL":"https:\/\/doi.org\/10.1145\/3204493.3204589","relation":{},"subject":[],"published":{"date-parts":[[2018,6,14]]}}}