{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T22:52:18Z","timestamp":1756075938592,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:00:00Z","timestamp":1584403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["826278"],"award-info":[{"award-number":["826278"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,17]]},"DOI":"10.1145\/3377325.3377537","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T23:14:49Z","timestamp":1583363689000},"page":"33-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots"],"prefix":"10.1145","author":[{"given":"Argyris","family":"Constantinides","sequence":"first","affiliation":[{"name":"University of Cyprus &amp; Cognitive UX Ltd., Nicosia, Cyprus"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"Heidelberg, Germany &amp; University of Cyprus, Nicosia, Cyprus"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Rio, Patras, Greece"}]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2020,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857491.2857527"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2008.11.017"},{"volume-title":"Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1 (BCS-HCI '08)","author":"Chiasson Sonia","key":"e_1_3_2_1_5_1","unstructured":"Sonia Chiasson , Alain Forget , Robert Biddle , and Paul C . van Oorschot. 2008. Influencing users towards better passwords: persuasive cued click- points . In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1 (BCS-HCI '08) . BCS Learning & Development Ltd., Swindon, UK, 121--130. Sonia Chiasson, Alain Forget, Robert Biddle, and Paul C. van Oorschot. 2008. Influencing users towards better passwords: persuasive cued click- points. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1 (BCS-HCI '08). BCS Learning & Development Ltd., Swindon, UK, 121--130."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320474"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209219.3209254"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352557"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236150"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_2_1_13_1","unstructured":"GP3 Eye Tracker. 2018. [Online] Available at: https:\/\/www.gazept.com\/  GP3 Eye Tracker. 2018. [Online] Available at: https:\/\/www.gazept.com\/"},{"volume-title":"J. M. Henderson & F","author":"Irwin David E.","key":"e_1_3_2_1_14_1","unstructured":"David E. Irwin . 2004. Fixation Location and Fixation Duration as Indices of Cognitive Processing . In J. M. Henderson & F . Ferreira (Eds.), The interface of language, vision, and action: Eye movements and the visual world (p. 105--133). Psychology Press . David E. Irwin. 2004. Fixation Location and Fixation Duration as Indices of Cognitive Processing. In J. M. Henderson & F. Ferreira (Eds.), The interface of language, vision, and action: Eye movements and the visual world (p. 105--133). Psychology Press."},{"key":"e_1_3_2_1_15_1","unstructured":"Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens and Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253  Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens and Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172996"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204589"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834121"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382307"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247743"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/i.iihcs.2018.02.003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738916"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557212"},{"volume-title":"Proceedings of the 16th USENIX Security Symposium (SS '07)","author":"Thorpe Julie","key":"e_1_3_2_1_29_1","unstructured":"Julie Thorpe , and Paul C . van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords . In Proceedings of the 16th USENIX Security Symposium (SS '07) . USENIX Association, Berkeley, CA, USA, Article 8, 16 pages. Julie Thorpe, and Paul C. van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of the 16th USENIX Security Symposium (SS '07). USENIX Association, Berkeley, CA, USA, Article 8, 16 pages."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057036"},{"key":"e_1_3_2_1_31_1","volume-title":"Episodic and semantic memory","author":"E.","year":"1972","unstructured":"Tulving, E. ( 1972 ). Episodic and semantic memory . Organization of memory, 1, 381--403. Tulving, E. (1972). Episodic and semantic memory. Organization of memory, 1, 381--403."},{"key":"e_1_3_2_1_32_1","volume-title":"The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security '12)","author":"Ur Blase","year":"2012","unstructured":"Blase Ur , Patrick Gage Kelley , Saranga Komanduri , Joel Lee , Michael Maass , Michelle L. Mazurek , Timothy Passaro , Richard Shay , Timothy Vidas , Lujo Bauer , Nicolas Christin , and Lorrie Faith Cranor . 2012 . How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security '12) . USENIX, Bellevue, WA, 65--80. Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security '12). USENIX, Bellevue, WA, 65--80."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053706"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0411"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701423"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534800"}],"event":{"name":"IUI '20: 25th International Conference on Intelligent User Interfaces","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Cagliari Italy","acronym":"IUI '20"},"container-title":["Proceedings of the 25th International Conference on Intelligent User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377325.3377537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377325.3377537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:17Z","timestamp":1750199597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377325.3377537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,17]]},"references-count":37,"alternative-id":["10.1145\/3377325.3377537","10.1145\/3377325"],"URL":"https:\/\/doi.org\/10.1145\/3377325.3377537","relation":{},"subject":[],"published":{"date-parts":[[2020,3,17]]},"assertion":[{"value":"2020-03-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}