{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:57:28Z","timestamp":1776333448875,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Mastercard"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354233","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1187-1199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["28 Blinks Later"],"prefix":"10.1145","author":[{"given":"Simon","family":"Eberz","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Giulio","family":"Lovisotto","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Kasper B.","family":"Rasmussen","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[{"name":"armasuisse, Bern, Switzerland"}]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_5"},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,3011--3020","author":"Bulling Andreas","year":"2012","unstructured":"Andreas Bulling , Florian Alt , and Albrecht Schmidt . 2012 . Increasing the securityof gaze-based cued-recall graphical passwords using saliency masks . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,3011--3020 . Andreas Bulling, Florian Alt, and Albrecht Schmidt. 2012. Increasing the securityof gaze-based cued-recall graphical passwords using saliency masks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,3011--3020."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.02.017"},{"key":"e_1_3_2_2_4_1","unstructured":"Lewis Carroll. 1930. Alice in Wonderland.  Lewis Carroll. 1930. Alice in Wonderland."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994374.2994393"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0748730412441172"},{"key":"e_1_3_2_2_7_1","volume-title":"Reynolds","author":"Doddington George","year":"1998","unstructured":"George Doddington , Walter Liggett , Alvin Martin , Mark Przybocki , and Douglas A . Reynolds . 1998 . Sheep, goats, lambs and wolves: A statistical analysis ofspeaker performance in the NIST 1998 speaker recognition evaluation. National Institut of Standards and Technology Gaithersburg( 1998), 1--4. George Doddington, Walter Liggett, Alvin Martin, Mark Przybocki, and Douglas A. Reynolds. 1998. Sheep, goats, lambs and wolves: A statistical analysis ofspeaker performance in the NIST 1998 speaker recognition evaluation. National Institut of Standards and Technology Gaithersburg(1998), 1--4."},{"key":"e_1_3_2_2_8_1","volume-title":"Eye tracking methodology: Theory and practice","author":"Duchowski Andrew T.","unstructured":"Andrew T. Duchowski . 2017. Eye tracking methodology: Theory and practice : Third edition. Springer International Publishing , Cham . 1--366 pages. https:\/\/doi.org\/10.1007\/978--3--319--57883--5 arXiv:arXiv:1011.1669v3 10.1007\/978--3--319--57883--5 Andrew T. Duchowski. 2017. Eye tracking methodology: Theory and practice: Third edition. Springer International Publishing, Cham. 1--366 pages. https:\/\/doi.org\/10.1007\/978--3--319--57883--5 arXiv:arXiv:1011.1669v3"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00053"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23408"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23203"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2904018"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053032"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634493"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712701"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38989-4_14"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Isaac Griswold-Steiner Zakery Fyke Mushfique Ahmed and Abdul Serwadda. 2018. Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement Biometrics.  Isaac Griswold-Steiner Zakery Fyke Mushfique Ahmed and Abdul Serwadda. 2018. Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement Biometrics.","DOI":"10.1109\/UEMCON.2018.8796625"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117536"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612953"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168563"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.1978.01770280111012"},{"key":"e_1_3_2_2_24_1","volume-title":"Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--6.","author":"Johnston Andrew H","year":"2015","unstructured":"Andrew H Johnston and Gary M Weiss . 2015 . Smartwatch-based biometric gait recognition. In Biometrics Theory , Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--6. Andrew H Johnston and Gary M Weiss. 2015. Smartwatch-based biometric gait recognition. In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on. IEEE, 1--6."},{"key":"e_1_3_2_2_25_1","volume-title":"Pupil diameter and load on memory. Science 154, 3756","author":"Kahneman Daniel","year":"1966","unstructured":"Daniel Kahneman and Jackson Beatty . 1966. Pupil diameter and load on memory. Science 154, 3756 ( 1966 ), 1583--1585. Daniel Kahneman and Jackson Beatty. 1966. Pupil diameter and load on memory. Science 154, 3756 (1966), 1583--1585."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_22"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1475-1313.2002.00023.x"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2005.11.033"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0886-3350(01)01222-6"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.01.003"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2350960"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0087357"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03201199"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139008927110"},{"key":"e_1_3_2_2_37_1","volume-title":"Factors affecting light-adapted pupil size in normal human subjects. Investigative ophthalmology & visual science 35, 3","author":"Winn B","year":"1994","unstructured":"B Winn , D Whitaker , D B Elliott , and N J Phillips . 1994. Factors affecting light-adapted pupil size in normal human subjects. Investigative ophthalmology & visual science 35, 3 ( 1994 ), 1132--1137. B Winn, D Whitaker, D B Elliott, and N J Phillips. 1994. Factors affecting light-adapted pupil size in normal human subjects. Investigative ophthalmology & visual science 35, 3 (1994), 1132--1137."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354233","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354233"}},"subtitle":["Tackling Practical Challenges of Eye Movement Biometrics"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":38,"alternative-id":["10.1145\/3319535.3354233","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354233","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}