{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:08:05Z","timestamp":1774721285388,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290607.3312959","type":"proceedings-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T15:55:05Z","timestamp":1556639705000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["LookUnlock"],"prefix":"10.1145","author":[{"given":"Markus","family":"Funk","sequence":"first","affiliation":[{"name":"Siemens CT &amp; Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Iori","family":"Mizutani","sequence":"additional","affiliation":[{"name":"Siemens CT &amp; University of St. Gallen, St. Gallen, Switzerland"}]},{"given":"Mareike","family":"Kritzler","sequence":"additional","affiliation":[{"name":"Siemens CT, Berkeley, CA, USA"}]},{"given":"Simon","family":"Mayer","sequence":"additional","affiliation":[{"name":"Siemens CT &amp; University of St. Gallen, St. Gallen, Switzerland"}]},{"given":"Florian","family":"Michahelles","sequence":"additional","affiliation":[{"name":"Siemens CT, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Andrea Bianchi and Ian Oakley. 2016. Wearable authentication: Trends and opportunities. it-Information Technology 58 5 (2016) 255--262.  Andrea Bianchi and Ian Oakley. 2016. Wearable authentication: Trends and opportunities. it-Information Technology 58 5 (2016) 255--262.","DOI":"10.1515\/itit-2016-0010"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2910674.2910679"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Ceenu George Mohamed Khamis Emanuel von Zezschwitz Marinus Burger Henri Schmidt Florian Alt and Heinrich Hussmann. 2017. Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. NDSS.  Ceenu George Mohamed Khamis Emanuel von Zezschwitz Marinus Burger Henri Schmidt Florian Alt and Heinrich Hussmann. 2017. Seamless and secure vr: Adapting and evaluating established authentication systems for virtual reality. NDSS.","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468528"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858436"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985777"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.05.010"},{"key":"e_1_3_2_2_8_1","volume-title":"2015 IEEE International Conference on. IEEE, 1452--1457","author":"Rehman Umair","year":"2015"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025964"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997251"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","location":"Glasgow Scotland Uk","acronym":"CHI '19","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290607.3312959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290607.3312959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:14Z","timestamp":1750204394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290607.3312959"}},"subtitle":["Using Spatial-Targets for User-Authentication on HMDs"],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":11,"alternative-id":["10.1145\/3290607.3312959","10.1145\/3290607"],"URL":"https:\/\/doi.org\/10.1145\/3290607.3312959","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}