{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:38:44Z","timestamp":1770223124966,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["426052422"],"award-info":[{"award-number":["426052422"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,2]]},"DOI":"10.1145\/3379157.3391421","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T04:13:04Z","timestamp":1590552784000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Gaze-based Authentication in Virtual Reality"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Liebers","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Germany"}]},{"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen"}]}],"member":"320","published-online":{"date-parts":[[2020,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Ceenu George Mohamed Khamis Emanuel von Zezschwitz Marinus Burger Henri Schmidt Florian Alt and Heinrich Hussmann. 2017. Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. NDSS.  Ceenu George Mohamed Khamis Emanuel von Zezschwitz Marinus Burger Henri Schmidt Florian Alt and Heinrich Hussmann. 2017. Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. NDSS.","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3119881.3119890"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855628.1855637"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281505.3281538"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206505.3206522"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Gregory Kramida. 2015. Resolving the vergence-accommodation conflict in head-mounted displays. IEEE transactions on visualization and computer graphics 22 7(2015) 1912\u20131931.  Gregory Kramida. 2015. Resolving the vergence-accommodation conflict in head-mounted displays. IEEE transactions on visualization and computer graphics 22 7(2015) 1912\u20131931.","DOI":"10.1109\/TVCG.2015.2473855"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05710-7_5"},{"key":"e_1_3_2_1_9_1","volume-title":"CHI \u201920 Extended Abstracts on Human Factors in Computing Systems (Honolulu, HI, USA)","author":"Liebers Jonathan"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3208333"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics. 23\u201330","author":"Mustafa Tahrima","year":"2018"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.11.1.3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2842614"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2800048"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978311"},{"key":"e_1_3_2_1_17_1","volume-title":"Biometric Authentication Based on Pupillary Light Reflex Using Neural Networks. In International Conference Image Analysis and Recognition. Springer, 89\u201396","author":"Yano Vitor","year":"2013"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7804002"}],"event":{"name":"ETRA '20: 2020 Symposium on Eye Tracking Research and Applications","location":"Stuttgart Germany","acronym":"ETRA '20","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["ACM Symposium on Eye Tracking Research and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379157.3391421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379157.3391421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:55Z","timestamp":1750199575000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379157.3391421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,2]]},"references-count":18,"alternative-id":["10.1145\/3379157.3391421","10.1145\/3379157"],"URL":"https:\/\/doi.org\/10.1145\/3379157.3391421","relation":{},"subject":[],"published":{"date-parts":[[2020,6,2]]},"assertion":[{"value":"2020-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}