{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:24Z","timestamp":1750221084366,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,25]],"date-time":"2018-11-25T00:00:00Z","timestamp":1543104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,25]]},"DOI":"10.1145\/3282894.3289741","type":"proceedings-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T13:18:16Z","timestamp":1544188696000},"page":"469-473","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["eNGAGE"],"prefix":"10.1145","author":[{"given":"Yasmeen","family":"Abdrabou","sequence":"first","affiliation":[{"name":"German University in Cairo, Bundeswehr University Munich"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow"}]},{"given":"Rana Mohamed","family":"Eisa","sequence":"additional","affiliation":[{"name":"University of Canada in Egypt"}]},{"given":"Sherif","family":"Ismael","sequence":"additional","affiliation":[{"name":"German University in Cairo"}]},{"given":"Amr","family":"Elmougy","sequence":"additional","affiliation":[{"name":"University of Canada in Egypt"}]}],"member":"320","published-online":{"date-parts":[[2018,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832919"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10)","author":"Aviv Adam J.","year":"1925","unstructured":"Adam J. Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M. Smith . 2010. Smudge Attacks on Smartphone Touch Screens . In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10) . USENIX Association, Berkeley, CA, USA, 1--7. http:\/\/dl.acm.org\/citation.cfm?id= 1925 004.1925009 Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10). USENIX Association, Berkeley, CA, USA, 1--7. http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2012.06.005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378063.1378122"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078810.3078815"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11)","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery , Sarah Meiklejohn , and Stefan Savage . 2011 . Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks . In Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11) . USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id= 2028052.2028058 Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the Moment: Characterizing the Efficacy of Thermal Camera-based Attacks. In Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11). USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id=2028052.2028058"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"}],"event":{"name":"MUM 2018: 17th International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM 2018","location":"Cairo Egypt"},"container-title":["Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282894.3289741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282894.3289741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:44Z","timestamp":1750208264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282894.3289741"}},"subtitle":["Resisting Shoulder surfing using Novel Gaze Gestures Authentication"],"short-title":[],"issued":{"date-parts":[[2018,11,25]]},"references-count":12,"alternative-id":["10.1145\/3282894.3289741","10.1145\/3282894"],"URL":"https:\/\/doi.org\/10.1145\/3282894.3289741","relation":{},"subject":[],"published":{"date-parts":[[2018,11,25]]},"assertion":[{"value":"2018-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}