{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:07:24Z","timestamp":1769148444905,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3365921.3365922","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T09:35:56Z","timestamp":1582364156000},"page":"107-116","source":"Crossref","is-referenced-by-count":14,"title":["Hide my Gaze with EOG!"],"prefix":"10.1145","author":[{"given":"Rainhard Dieter","family":"Findling","sequence":"first","affiliation":[{"name":"Ambient Intelligence Group, Department of Communications and Networking, Aalto University Espoo, Finland"}]},{"given":"Tahmid","family":"Quddus","sequence":"additional","affiliation":[{"name":"Ambient Intelligence Group, Department of Communications and Networking, Aalto University Espoo, Finland"}]},{"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[{"name":"Ambient Intelligence Group, Department of Communications and Networking, Aalto University Espoo, Finland"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of the 4th USENIX conference on offensive technologies","author":"Aviv Adam J.","year":"1925"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the 10th International Conference on Ubiquitous Computing (UbiComp 2008) (ACM International Conference Proceeding Series)","volume":"344","author":"Bulling Andreas","year":"2008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520468"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.86"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 19th Australasian Conference on Computer-Human Interaction: Entertaining User Interfaces (OZCHI '07)","author":"Luca Alexander De","year":"2007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378063.1378122"},{"key":"e_1_3_2_1_11_1","volume-title":"Human-Computer Interaction -- INTERACT","author":"Drewes Heiko","year":"2007"},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices","volume":"9","author":"Findling Rainhard Dieter","year":"2013","journal-title":"International Journal of Pervasive Computing and Communications"},{"key":"e_1_3_2_1_13_1","first-page":"4","article-title":"ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices","volume":"16","author":"Findling Rainhard Dieter","year":"2017","journal-title":"IEEE Transactions on Mobile Computing (TMC)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20521-8_27"},{"key":"e_1_3_2_1_15_1","first-page":"2","article-title":"Speed and Accuracy of Gaze Gestures","volume":"3","author":"Heikkil\u00e4 Henna","year":"2009","journal-title":"Journal of Eye Movement Research"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Daniel Hintze Rainhard Dieter Findling Muhammad Muaaz Eckhard Koch and Ren\u00e9 Mayrhofer. 2015. CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015) Osaka Japan. In Proc. 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015). ACM Osaka Japan 169--172. https:\/\/doi.org\/10.1145\/2800835.2800906  Daniel Hintze Rainhard Dieter Findling Muhammad Muaaz Eckhard Koch and Ren\u00e9 Mayrhofer. 2015. CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015) Osaka Japan. In Proc. 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015). ACM Osaka Japan 169--172. https:\/\/doi.org\/10.1145\/2800835.2800906","DOI":"10.1145\/2800835.2800906"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684103.2684156"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090078"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837126.2843845"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"M. S. Hossain Kristie Huda S M. Sadman Rahman and Mohiuddin Ahmad. 2015. Implementation of an EOG based security system by analyzing eye movement patterns. https:\/\/doi.org\/10.1109\/ICAEE.2015.7506818  M. S. Hossain Kristie Huda S M. Sadman Rahman and Mohiuddin Ahmad. 2015. Implementation of an EOG based security system by analyzing eye movement patterns. https:\/\/doi.org\/10.1109\/ICAEE.2015.7506818","DOI":"10.1109\/ICAEE.2015.7506818"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168602"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2725449"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743740"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641695"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1021\/ac60214a047"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702365"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501614"},{"key":"e_1_3_2_1_32_1","article-title":"On Predictive Models and User-drawn Graphical Passwords","volume":"10","author":"van Oorschot Paul C.","year":"2008","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463202"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 16th Annual ACM Symposium on User Interface Software and Technology (UIST '03)","author":"Wobbrock Jacob O."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 2008 Symposium on Eye Tracking Research & Applications (ETRA '08)","author":"Wobbrock Jacob O."}],"event":{"name":"MoMM2019: The 17th International Conference on Advances in Mobile Computing & Multimedia","location":"Munich Germany","acronym":"MoMM2019","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"]},"container-title":["Proceedings of the 17th International Conference on Advances in Mobile Computing &amp; Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365922","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365921.3365922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:37Z","timestamp":1750202617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365921.3365922"}},"subtitle":["Towards Closed-Eye Gaze Gesture Passwords that Resist Observation-Attacks with Electrooculography in Smart Glasses"],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":35,"alternative-id":["10.1145\/3365921.3365922","10.1145\/3365921"],"URL":"https:\/\/doi.org\/10.1145\/3365921.3365922","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]}}}