{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:20Z","timestamp":1750220720051,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T00:00:00Z","timestamp":1587772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG","award":["425869382."],"award-info":[{"award-number":["425869382."]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,25]]},"DOI":"10.1145\/3334480.3375144","type":"proceedings-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T10:15:46Z","timestamp":1590660946000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication Beyond Desktops and Smartphones"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Schneegass","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"given":"Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Munich, Germany"}]},{"given":"Daniel","family":"Vogel","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2537748"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858165"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS '14)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS '14). USENIX Association, Berkeley, CA, USA, 213--230. http: \/\/dl.acm.org\/citation.cfm?id=3235838.3235857"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702518"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210317"},{"key":"e_1_3_2_1_9_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Mecke Lukas","year":"2019","unstructured":"Lukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, and Florian Alt. 2019. Exploring intentional behaviour modifications for password typing on mobile touchscreen devices. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3375144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3334480.3375144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:27Z","timestamp":1750199607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3375144"}},"subtitle":["Novel Approaches for Smart Devices and Environments"],"short-title":[],"issued":{"date-parts":[[2020,4,25]]},"references-count":11,"alternative-id":["10.1145\/3334480.3375144","10.1145\/3334480"],"URL":"https:\/\/doi.org\/10.1145\/3334480.3375144","relation":{},"subject":[],"published":{"date-parts":[[2020,4,25]]},"assertion":[{"value":"2020-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}