{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:29:16Z","timestamp":1768012156059,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1947022"],"award-info":[{"award-number":["CNS-1947022"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445070","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T05:58:10Z","timestamp":1620453490000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["\u201cI...Got my Nose-Print. But it Wasn\u2019t Accurate\u201d: How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices"],"prefix":"10.1145","author":[{"given":"Brittany","family":"Lewis","sequence":"first","affiliation":[{"name":"Computer Science University of Rhode Island, United States"}]},{"given":"Krishna","family":"Venkatasubramanian","sequence":"additional","affiliation":[{"name":"Computer Science and Statistics University of Rhode Island, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319837"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030024.3040977"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732862"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384983"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208354"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753649"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3418022"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700648.2811326"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842993.1843076"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3418005"},{"key":"e_1_3_2_1_11_1","volume-title":"Unlock your Mac and approve tasks with Apple Watch","author":"Apple Inc. 2020.","unstructured":"Apple Inc. 2020. Unlock your Mac and approve tasks with Apple Watch . Apple Inc . https:\/\/support.apple.com\/guide\/imac\/unlock-and-approve-with-apple-watch-apda4d638ecf\/mac Apple Inc. 2020. Unlock your Mac and approve tasks with Apple Watch. Apple Inc. https:\/\/support.apple.com\/guide\/imac\/unlock-and-approve-with-apple-watch-apda4d638ecf\/mac"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3240992"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971722"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414471.1414510"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378904.3378908"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0194111"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466160"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900008.1900119"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3175536.3176652"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281505.3283386"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3416994"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.02.002"},{"key":"e_1_3_2_1_24_1","volume-title":"Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Dosono Bryan","year":"2015","unstructured":"Bryan Dosono , Jordan Hayes , and Yang Wang . 2015 . \u201c I\u2019m Stuck!\u201d: A Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 151\u2013168. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/dosono Bryan Dosono, Jordan Hayes, and Yang Wang. 2015. \u201cI\u2019m Stuck!\u201d: A Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 151\u2013168. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/dosono"},{"key":"e_1_3_2_1_25_1","unstructured":"Nuance Communications 2020. Dragon Speech Recognition. Nuance Communications. https:\/\/www.nuance.com\/dragon.html  Nuance Communications 2020. Dragon Speech Recognition. Nuance Communications. https:\/\/www.nuance.com\/dragon.html"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195475"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354233"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3416987"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501750.1501839"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1978248.1978360"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1978248.1978360"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357250"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3134788"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.19"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131785.3131805"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049536.2049541"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2015649"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3416990"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378827"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581192"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581203"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2726965"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858376"},{"key":"e_1_3_2_1_48_1","volume-title":"Information Technologies in Biomedicine, Ewa Pi\u0119tka and Jacek Kawa (Eds.)","author":"Kocejko Tomasz","unstructured":"Tomasz Kocejko and Jerzy Wtorek . 2012. Gaze Pattern Lock for Elders and Disabled . In Information Technologies in Biomedicine, Ewa Pi\u0119tka and Jacek Kawa (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 589\u2013602. Tomasz Kocejko and Jerzy Wtorek. 2012. Gaze Pattern Lock for Elders and Disabled. In Information Technologies in Biomedicine, Ewa Pi\u0119tka and Jacek Kawa (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 589\u2013602."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001269.2001275"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878875"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300828"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300612"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598535"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops48775.2020.9156171"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/2501134.2501139"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567429.2567452"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384973"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/1734454.1734499"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661400"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702188"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019943.3019945"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661362"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300257"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661372"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661395"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apmr.2007.03.038"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308561.3354623"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2725458"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554948"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/1108368.1108384"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0016"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978947"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2018.2882731"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI)","author":"Renaud Karen","year":"2018","unstructured":"Karen Renaud , Kenneth C. Scott-Brown , and Andrea Szymkowiak . 2018. Designing authentication with seniors in mind . In Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI) 2018 , Barcelona, Spain . Association for Computing Machinery , New York, NY, USA, 7. https:\/\/mobilehci.acm.org\/2018\/, https:\/\/csalsa.gitlab.io\/mobilehciageing\/index.html20th International Conference on Human-Computer Interaction with Mobile Devices and Services : Beyond mobile: the next 20 years, MobileHCI 2018 ; Conference date: 03-09-2018 Through 06-09-2018. Karen Renaud, Kenneth C. Scott-Brown, and Andrea Szymkowiak. 2018. Designing authentication with seniors in mind. In Proceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI) 2018, Barcelona, Spain. Association for Computing Machinery, New York, NY, USA, 7. https:\/\/mobilehci.acm.org\/2018\/, https:\/\/csalsa.gitlab.io\/mobilehciageing\/index.html20th International Conference on Human-Computer Interaction with Mobile Devices and Services : Beyond mobile: the next 20 years, MobileHCI 2018 ; Conference date: 03-09-2018 Through 06-09-2018."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056540.3056552"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192714.3192821"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3075301"},{"key":"e_1_3_2_1_79_1","volume-title":"Signal Processing and Multimedia, Tai-hoon Kim, Sankar\u00a0K. Pal, William\u00a0I. Grosky, Niki Pissinou, Timothy\u00a0K. Shih, and Dominik \u015al\u0119zak (Eds.)","author":"Saquib Zia","unstructured":"Zia Saquib , Nirmala Salam , Rekha\u00a0 P. Nair , Nipun Pandey , and Akanksha Joshi . 2010. A Survey on Automatic Speaker Recognition Systems . In Signal Processing and Multimedia, Tai-hoon Kim, Sankar\u00a0K. Pal, William\u00a0I. Grosky, Niki Pissinou, Timothy\u00a0K. Shih, and Dominik \u015al\u0119zak (Eds.) . Springer Berlin Heidelberg, Berlin , Heidelberg , 134\u2013145. Zia Saquib, Nirmala Salam, Rekha\u00a0P. Nair, Nipun Pandey, and Akanksha Joshi. 2010. A Survey on Automatic Speaker Recognition Systems. In Signal Processing and Multimedia, Tai-hoon Kim, Sankar\u00a0K. Pal, William\u00a0I. Grosky, Niki Pissinou, Timothy\u00a0K. Shih, and Dominik \u015al\u0119zak (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 134\u2013145."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3134785"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932400"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.5120\/12386-8738"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/1983222.1983250"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281745"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3344416"},{"key":"e_1_3_2_1_87_1","volume-title":"Census Bureau Reports","author":"S.","year":"2012","unstructured":"\u201dU. S. Census Bureau Reports \u201d 2012 . Nearly 1 in 5 People Have a Disability in the U.S., Census Bureau Reports. \u201dU.S. Census Bureau Reports\u201d . \u201dU.S. Census Bureau Reports\u201d 2012. Nearly 1 in 5 People Have a Disability in the U.S., Census Bureau Reports. \u201dU.S. Census Bureau Reports\u201d."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053069"},{"key":"e_1_3_2_1_89_1","unstructured":"WebAIM 2012. WebAIM: Motor Disabilities Types of Motor Disabilities. WebAIM.  WebAIM 2012. WebAIM: Motor Disabilities Types of Motor Disabilities. WebAIM."},{"key":"e_1_3_2_1_90_1","unstructured":"Windows security 2017. Interactive logon Do not require CTRL ALT DEL (Windows 10) - Windows security. Windows security. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/interactive-logon-do-not-require-ctrl-alt-del  Windows security 2017. Interactive logon Do not require CTRL ALT DEL (Windows 10) - Windows security. Windows security. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/interactive-logon-do-not-require-ctrl-alt-del"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3134793"},{"key":"e_1_3_2_1_92_1","unstructured":"Yubikey 2020. YubiKey. Yubikey. https:\/\/www.yubico.com\/products\/  Yubikey 2020. YubiKey. Yubikey. https:\/\/www.yubico.com\/products\/"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556981"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025790"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639642.1639689"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445070","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:30Z","timestamp":1750195710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":96,"alternative-id":["10.1145\/3411764.3445070","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445070","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}