{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T08:14:10Z","timestamp":1777796050921,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T00:00:00Z","timestamp":1571011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["644780"],"award-info":[{"award-number":["644780"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,14]]},"DOI":"10.1145\/3340555.3353734","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T12:49:48Z","timestamp":1571316588000},"page":"329-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["TouchGazePath: Multimodal Interaction with Touch and Gaze Path for Secure Yet Efficient PIN Entry"],"prefix":"10.1145","author":[{"given":"Chandan","family":"Kumar","sequence":"first","affiliation":[{"name":"University of Koblenz, Germany"}]},{"given":"Daniyal","family":"Akbari","sequence":"additional","affiliation":[{"name":"University of Koblenz, Germany"}]},{"given":"Raphael","family":"Menges","sequence":"additional","affiliation":[{"name":"University of Koblenz, Germany"}]},{"given":"Scott","family":"MacKenzie","sequence":"additional","affiliation":[{"name":"York University, Canada"}]},{"given":"Steffen","family":"Staab","sequence":"additional","affiliation":[{"name":"University of Koblenz-Landau, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the ACM Symposium on Eye Tracking Research & Applications(ETRA \u201916)","author":"S.","unstructured":"Darrell\u00a0 S. Best and Andrew\u00a0T. Duchowski. 2016. A rotary dial for gaze-based PIN entry . In Proceedings of the ACM Symposium on Eye Tracking Research & Applications(ETRA \u201916) . ACM, New York, 69\u201376. https:\/\/doi.org\/10.1145\/2857491.2857527 10.1145\/2857491.2857527 Darrell\u00a0S. Best and Andrew\u00a0T. Duchowski. 2016. A rotary dial for gaze-based PIN entry. In Proceedings of the ACM Symposium on Eye Tracking Research & Applications(ETRA \u201916). ACM, New York, 69\u201376. https:\/\/doi.org\/10.1145\/2857491.2857527"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274005.3274029"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"PyGaze: an open-source, cross-platform toolbox for minimal-effort programming of eye-tracking experiments","volume":"46","author":"Dalmaijer S","year":"2013","unstructured":"Edwin\u00a0 S Dalmaijer , Sebastiaan Math\u00f4t , and Stefan Van\u00a0der Stigchel . 2013 . PyGaze: an open-source, cross-platform toolbox for minimal-effort programming of eye-tracking experiments . Behavior Research Methods 46 , 4 (2013), 1 \u2013 16 . Edwin\u00a0S Dalmaijer, Sebastiaan Math\u00f4t, and Stefan Van\u00a0der Stigchel. 2013. PyGaze: an open-source, cross-platform toolbox for minimal-effort programming of eye-tracking experiments. Behavior Research Methods 46, 4 (2013), 1\u201316.","journal-title":"Behavior Research Methods"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753490"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324932"},{"key":"e_1_3_2_1_9_1","volume-title":"CHI \u201908 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201908)","author":"De\u00a0Luca Alexander","unstructured":"Alexander De\u00a0Luca , Roman Weiss , Heinrich Hussmann , and Xueli An. 2008. Eyepass - Eye-stroke Authentication for Public Terminals . In CHI \u201908 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201908) . ACM , New York, USA , 3003\u20133008. https:\/\/doi.org\/10.1145\/1358628.1358798 10.1145\/1358628.1358798 Alexander De\u00a0Luca, Roman Weiss, Heinrich Hussmann, and Xueli An. 2008. Eyepass - Eye-stroke Authentication for Public Terminals. In CHI \u201908 Extended Abstracts on Human Factors in Computing Systems(CHI EA \u201908). ACM, New York, USA, 3003\u20133008. https:\/\/doi.org\/10.1145\/1358628.1358798"},{"key":"e_1_3_2_1_10_1","volume-title":"The 4th Conference on Communication by Gaze Interaction (COGAIN \u201908)","author":"Dunphy Paul","year":"2008","unstructured":"Paul Dunphy , Andrew Fitch , and Patrick Olivier . 2008 . Gaze-contingent passwords at the ATM . In The 4th Conference on Communication by Gaze Interaction (COGAIN \u201908) . COGAIN, Prague, Czech Rebublic, 2\u20135. Paul Dunphy, Andrew Fitch, and Patrick Olivier. 2008. Gaze-contingent passwords at the ATM. In The 4th Conference on Communication by Gaze Interaction (COGAIN \u201908). COGAIN, Prague, Czech Rebublic, 2\u20135."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025599"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97246"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078810.3078815"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054730"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2016.52"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858335"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307671"},{"key":"e_1_3_2_1_21_1","volume-title":"Analysis and improvement on a unimodal haptic PIN-entry method. Mobile Information Systems","author":"Lee Mun-Kyu","year":"2017","unstructured":"Mun-Kyu Lee , Jin Yoo , and Hyeonjin Nam . 2017. Analysis and improvement on a unimodal haptic PIN-entry method. Mobile Information Systems Volume 2017 , Article ID 6047312( 2017 ), 17 pages. https:\/\/doi.org\/10.1155\/2017\/6047312 10.1155\/2017 Mun-Kyu Lee, Jin Yoo, and Hyeonjin Nam. 2017. Analysis and improvement on a unimodal haptic PIN-entry method. Mobile Information Systems Volume 2017, Article ID 6047312(2017), 17 pages. https:\/\/doi.org\/10.1155\/2017\/6047312"},{"key":"e_1_3_2_1_22_1","volume-title":"Gaze interaction and applications of eye tracking: Advances in assistive technologies, P.\u00a0Majaranta, H.\u00a0Aoki, M.\u00a0Donegan, D.\u00a0W. Hansen, J.\u00a0P. Hansen, A.\u00a0Hyrskykari, and R\u00e4ih\u00e4 K.-J. (Eds.). IGI Global","author":"MacKenzie Scott","unstructured":"I.\u00a0 Scott MacKenzie . 2012. Evaluating eye tracking systems for computer input . In Gaze interaction and applications of eye tracking: Advances in assistive technologies, P.\u00a0Majaranta, H.\u00a0Aoki, M.\u00a0Donegan, D.\u00a0W. Hansen, J.\u00a0P. Hansen, A.\u00a0Hyrskykari, and R\u00e4ih\u00e4 K.-J. (Eds.). IGI Global , Hershey, PA , 205\u2013225. https:\/\/doi.org\/10.4018\/978-1-61350-098-9 10.4018\/978-1-61350-098-9 I.\u00a0Scott MacKenzie. 2012. Evaluating eye tracking systems for computer input. In Gaze interaction and applications of eye tracking: Advances in assistive technologies, P.\u00a0Majaranta, H.\u00a0Aoki, M.\u00a0Donegan, D.\u00a0W. Hansen, J.\u00a0P. Hansen, A.\u00a0Hyrskykari, and R\u00e4ih\u00e4 K.-J. (Eds.). IGI Global, Hershey, PA, 205\u2013225. https:\/\/doi.org\/10.4018\/978-1-61350-098-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"P\u00e4ivi Majaranta. 2011. Gaze Interaction and Applications of Eye Tracking: Advances in Assistive Technologies: Advances in Assistive Technologies. IGI Global.  P\u00e4ivi Majaranta. 2011. Gaze Interaction and Applications of Eye Tracking: Advances in Assistive Technologies: Advances in Assistive Technologies. IGI Global.","DOI":"10.4018\/978-1-61350-098-9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326302"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3058555.3058582"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338844"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986037"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Thies Pfeiffer. 2018. Gaze-based assistive technologies. In Smart Technologies: Breakthroughs in Research and Practice. IGI Global 44\u201366.  Thies Pfeiffer. 2018. Gaze-based assistive technologies. In Smart Technologies: Breakthroughs in Research and Practice. IGI Global 44\u201366.","DOI":"10.4018\/978-1-5225-2589-9.ch003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22668-2_27"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984514"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053070"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025455"},{"key":"e_1_3_2_1_33_1","volume-title":"SafetyPIN: Secure PIN Entry Through Eye Tracking. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 426\u2013435","author":"Seetharama Mythreya","year":"2015","unstructured":"Mythreya Seetharama , Volker Paelke , and Carsten R\u00f6cker . 2015 . SafetyPIN: Secure PIN Entry Through Eye Tracking. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 426\u2013435 . Mythreya Seetharama, Volker Paelke, and Carsten R\u00f6cker. 2015. SafetyPIN: Secure PIN Entry Through Eye Tracking. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 426\u2013435."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/29933.275627"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330689"}],"event":{"name":"ICMI '19: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION","location":"Suzhou China","acronym":"ICMI '19"},"container-title":["2019 International Conference on Multimodal Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340555.3353734","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340555.3353734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:28Z","timestamp":1750202008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340555.3353734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,14]]},"references-count":34,"alternative-id":["10.1145\/3340555.3353734","10.1145\/3340555"],"URL":"https:\/\/doi.org\/10.1145\/3340555.3353734","relation":{},"subject":[],"published":{"date-parts":[[2019,10,14]]},"assertion":[{"value":"2019-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}