{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:29:09Z","timestamp":1758893349483,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T00:00:00Z","timestamp":1538438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,2]]},"DOI":"10.1145\/3242969.3243008","type":"proceedings-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T12:09:29Z","timestamp":1538482169000},"page":"268-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Path Word"],"prefix":"10.1145","author":[{"given":"Hassoumi","family":"Almoctar","sequence":"first","affiliation":[{"name":"\u00c9cole Nationale de l'Aviation Civile, Toulouse, France"}]},{"given":"Pourang","family":"Irani","sequence":"additional","affiliation":[{"name":"University of Manitoba, Winnipeg, Canada"}]},{"given":"Vsevolod","family":"Peysakhovich","sequence":"additional","affiliation":[{"name":"ISAE-SUPAERO, Toulouse, France"}]},{"given":"Christophe","family":"Hurter","sequence":"additional","affiliation":[{"name":"\u00c9cole Nationale de l'Aviation Civile, Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2018,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Smudge Attacks on Smartphone Touch Screens","volume":"10","author":"Aviv Adam J","year":"2010","unstructured":"Adam J Aviv , Katherine L Gibson , Evan Mossop , Matt Blaze , and Jonathan M Smith . 2010 . Smudge Attacks on Smartphone Touch Screens . Woot Vol. 10 (2010), 1 -- 7 . Adam J Aviv, Katherine L Gibson, Evan Mossop, Matt Blaze, and Jonathan M Smith . 2010. Smudge Attacks on Smartphone Touch Screens. Woot Vol. 10 (2010), 1--7.","journal-title":"Woot"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518995"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis.2014.16"},{"key":"e_1_3_2_1_5_1","volume-title":"1\u20ac Filter: A Simple Speed-based Low-pass Filter for Noisy Input in Interactive Systems. (05","author":"Casiez G\u00e9ry","year":"2012","unstructured":"G\u00e9ry Casiez , Nicolas Roussel , and Daniel Vogel . 2012. 1\u20ac Filter: A Simple Speed-based Low-pass Filter for Noisy Input in Interactive Systems. (05 . 2012 ). G\u00e9ry Casiez, Nicolas Roussel, and Daniel Vogel . 2012. 1\u20ac Filter: A Simple Speed-based Low-pass Filter for Noisy Input in Interactive Systems. (05 . 2012)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578153.2583042"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.7.4.1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324932"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098561"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"volume-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"Ester Martin","key":"e_1_3_2_1_13_1","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , and Xiaowei Xu . 1996. A density-based algorithm for discovering clusters in large spatial databases with noise . AAAI Press , 226--231. Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, and Xiaowei Xu . 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. AAAI Press, 226--231."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807499"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126616"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025599"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAMC.1983.764801"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(76)90042-X"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.296"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.16910\/jerm.10.5.6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136759"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025920"},{"volume-title":"Virtual Environments and Advanced Interface Design","author":"Jacob Robert J. K.","key":"e_1_3_2_1_23_1","unstructured":"Robert J. K. Jacob . 1995. Virtual Environments and Advanced Interface Design . Oxford University Press, Inc. , New York, NY, USA , Chapter Eye Tracking in Advanced Interface Design, 258--288. deftempurl%http:\/\/dl.acm.org\/citation.cfm?id=216164.216178 tempurl Robert J. K. Jacob . 1995. Virtual Environments and Advanced Interface Design. Oxford University Press, Inc., New York, NY, USA, Chapter Eye Tracking in Advanced Interface Design, 258--288. deftempurl%http:\/\/dl.acm.org\/citation.cfm?id=216164.216178 tempurl"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641695"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152832.3152851"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173738"},{"volume-title":"Human Centered Robot Systems","author":"Koesling Hendrik","key":"e_1_3_2_1_29_1","unstructured":"Hendrik Koesling , Martin Zoellner , Lorenz Sichelschmidt , and Helge Ritter . 2009. With a flick of the eye: Assessing gaze-controlled human-computer interaction . In Human Centered Robot Systems . Springer , 83--92. Hendrik Koesling, Martin Zoellner, Lorenz Sichelschmidt, and Helge Ritter . 2009. With a flick of the eye: Assessing gaze-controlled human-computer interaction. In Human Centered Robot Systems. Springer, 83--92."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173655"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/59580"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173964"},{"key":"e_1_3_2_1_33_1","volume-title":"Aspect Ratio Adaptive Normalization for Handwritten Character Recognition Advances in Multimodal Interfaces -- ICMI","author":"Liu Cheng-Lin","year":"2000","unstructured":"Cheng-Lin Liu , Masashi Koga , Hiroshi Sako , and Hiromichi Fujisawa . 2000. Aspect Ratio Adaptive Normalization for Handwritten Character Recognition Advances in Multimodal Interfaces -- ICMI 2000 , bibfieldeditorTieniu Tan, Yuanchun Shi , and Wen Gao (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 418--425. Cheng-Lin Liu, Masashi Koga, Hiroshi Sako, and Hiromichi Fujisawa . 2000. Aspect Ratio Adaptive Normalization for Handwritten Character Recognition Advances in Multimodal Interfaces -- ICMI 2000, bibfieldeditorTieniu Tan, Yuanchun Shi, and Wen Gao (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 418--425."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2006.313440"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2501998"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993148.2993199"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/2347233"},{"volume-title":"Human Aspects of Information Security, Privacy, and Trust, bibfieldeditor","author":"Seetharama Mythreya","key":"e_1_3_2_1_38_1","unstructured":"Mythreya Seetharama , Volker Paelke , and Carsten R\u00f6cker . 2015. SafetyPIN: Secure PIN Entry Through Eye Tracking . In Human Aspects of Information Security, Privacy, and Trust, bibfieldeditor Theo Tryfonas and Ioannis Askoxylakis (Eds.). Springer International Publishing , Cham, 426--435. Mythreya Seetharama, Volker Paelke, and Carsten R\u00f6cker . 2015. SafetyPIN: Secure PIN Entry Through Eye Tracking. In Human Aspects of Information Security, Privacy, and Trust, bibfieldeditorTheo Tryfonas and Ioannis Askoxylakis (Eds.). Springer International Publishing, Cham, 426--435."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785890"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028014.1028045"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174010"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493477"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/964696.964703"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294238"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522848.2522850"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025790"}],"event":{"name":"ICMI '18: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION","sponsor":["SIGCHI Specialist Interest Group in Computer-Human Interaction of the ACM"],"location":"Boulder CO USA","acronym":"ICMI '18"},"container-title":["Proceedings of the 20th ACM International Conference on Multimodal Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242969.3243008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242969.3243008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:25Z","timestamp":1750210765000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242969.3243008"}},"subtitle":["A Multimodal Password Entry Method for Ad-hoc Authentication Based on Digits' Shape and Smooth Pursuit Eye Movements"],"short-title":[],"issued":{"date-parts":[[2018,10,2]]},"references-count":48,"alternative-id":["10.1145\/3242969.3243008","10.1145\/3242969"],"URL":"https:\/\/doi.org\/10.1145\/3242969.3243008","relation":{},"subject":[],"published":{"date-parts":[[2018,10,2]]},"assertion":[{"value":"2018-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}