{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:39:13Z","timestamp":1769733553360,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100013915","name":"EPSRC","doi-asserted-by":"publisher","award":["EP\/V008870\/1"],"award-info":[{"award-number":["EP\/V008870\/1"]}],"id":[{"id":"10.13039\/501100013915","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DFG Grants","award":["316457582 and 425869382"],"award-info":[{"award-number":["316457582 and 425869382"]}]},{"name":"dtec.bw ? Digitalization and Technology Research Center of the Bundeswehr (Voice of Wisdom)"},{"name":"Studienstiftung des deutschen Volkes (German Academic Scholarship Foundation)"},{"name":"Royal Society of Edinburgh (RSE)","award":["65040"],"award-info":[{"award-number":["65040"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.1145\/3448017.3457384","type":"proceedings-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T13:46:26Z","timestamp":1621950386000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["GazeMeter: Exploring the Usage of Gaze Behaviour to Enhance Password Assessments"],"prefix":"10.1145","author":[{"given":"Yasmeen","family":"Abdrabou","sequence":"first","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]},{"given":"Ahmed","family":"Shams","sequence":"additional","affiliation":[{"name":"German University in Cairo, Egypt"}]},{"given":"Mohamed Omar","family":"Mantawy","sequence":"additional","affiliation":[{"name":"German University in Cairo, Egypt"}]},{"given":"Anam","family":"Ahmad Khan","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Australia"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]},{"given":"Yomna","family":"Abdelrahman","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351227"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319837"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358786"},{"key":"e_1_3_2_1_4_1","volume-title":"Advances in Human Factors in Simulation and Modeling, Daniel\u00a0N","author":"Bayat Akram","unstructured":"Akram Bayat and Marc Pomplun. 2018. Biometric Identification Through Eye-Movement Patterns. In Advances in Human Factors in Simulation and Modeling, Daniel\u00a0N. Cassenti (Ed.). Springer International Publishing, Cham, 583\u2013594."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.86"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.02.017"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274005.3274029"},{"key":"e_1_3_2_1_9_1","unstructured":"Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and XiaoFeng Wang. 2014. The tangled web of password reuse.. In NDSS Vol.\u00a014. 23\u201326."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23268"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173856"},{"key":"e_1_3_2_1_12_1","volume-title":"2018 APWG Symposium on Electronic Crime Research (eCrime). 1\u20139.","author":"Dupuis M.","unstructured":"M. Dupuis and F. Khan. 2018. Effects of peer feedback on password strength. In 2018 APWG Symposium on Electronic Crime Research (eCrime). 1\u20139."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_15_1","volume-title":"Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Flor\u00eancio Dinei","year":"2014","unstructured":"Dinei Flor\u00eancio, Cormac Herley, and Paul\u00a0C. van Oorschot. 2014. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 575\u2013590. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/florencio"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_17_1","volume-title":"Persuasive Technology, Harri Oinas-Kukkonen, Per Hasle, Marja Harjumaa, Katarina Segerst\u00e5hl, and Peter \u00d8hrstr\u00f8m (Eds.)","author":"Forget Alain","unstructured":"Alain Forget, Sonia Chiasson, P.\u00a0C. van Oorschot, and Robert Biddle. 2008. Persuasion for Stronger Passwords: Motivation and Pilot Study. In Persuasive Technology, Harri Oinas-Kukkonen, Per Hasle, Marja Harjumaa, Katarina Segerst\u00e5hl, and Peter \u00d8hrstr\u00f8m (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 140\u2013150."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Tenth USENIX Conference on Usable Privacy and Security","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (Menlo Park, CA) (SOUPS \u201914). USENIX Association, USA, 213\u2013230."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0064937"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2018.00105"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.7591\/9781501725814"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204589"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229452"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2007.4374533"},{"key":"e_1_3_2_1_29_1","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. In Advances in neural information processing systems. 4765\u20134774."},{"key":"e_1_3_2_1_30_1","volume-title":"Text entry by gaze: Utilizing eye-tracking. Text entry systems: Mobility, accessibility, universality","author":"Majaranta P\u00e4ivi","year":"2007","unstructured":"P\u00e4ivi Majaranta and Kari-Jouko R\u00e4ih\u00e4. 2007. Text entry by gaze: Utilizing eye-tracking. Text entry systems: Mobility, accessibility, universality (2007), 175\u2013187."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1862758.1862770"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010052"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/355017.355028"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053100"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702586"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557377"},{"key":"e_1_3_2_1_38_1","volume-title":"Technology and Practice of Passwords, Frank Stajano, Stig\u00a0F","author":"Stobert Elizabeth","unstructured":"Elizabeth Stobert and Robert Biddle. 2016. Expert Password Management. In Technology and Practice of Passwords, Frank Stajano, Stig\u00a0F. Mj\u00f8lsnes, Graeme Jenkinson, and Per Thorsheim (Eds.). Springer International Publishing, Cham, 3\u201320."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"e_1_3_2_1_41_1","volume-title":"The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Ur Blase","year":"2012","unstructured":"Blase Ur, Patrick\u00a0Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle\u00a0L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 65\u201380. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/ur"},{"key":"e_1_3_2_1_42_1","volume-title":"Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Ur Blase","year":"2015","unstructured":"Blase Ur, Fumiko Noma, Jonathan Bees, Sean\u00a0M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2015. \u201dI Added \u2019!\u2019 at the End to Make It Secure\u201d: Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 123\u2013140. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/ur"},{"key":"e_1_3_2_1_43_1","volume-title":"Person Identification Using Eye Movements and Post Saccadic Oscillations. In 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems. 580\u2013583","author":"Vitonis D.","year":"2014","unstructured":"D. Vitonis and D.\u00a0W. Hansen. 2014. Person Identification Using Eye Movements and Post Saccadic Oscillations. In 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems. 580\u2013583."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_23"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_47_1","volume-title":"25th {USENIX} Security Symposium ({USENIX} Security 16). 157\u2013173.","author":"Wheeler Daniel\u00a0Lowe","unstructured":"Daniel\u00a0Lowe Wheeler. 2016. zxcvbn: Low-budget password strength estimation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 157\u2013173."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161410"}],"event":{"name":"ETRA '21: 2021 Symposium on Eye Tracking Research and Applications","location":"Virtual Event Germany","acronym":"ETRA '21","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["ACM Symposium on Eye Tracking Research and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448017.3457384","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448017.3457384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:04Z","timestamp":1750195504000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448017.3457384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":48,"alternative-id":["10.1145\/3448017.3457384","10.1145\/3448017"],"URL":"https:\/\/doi.org\/10.1145\/3448017.3457384","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"2021-05-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}