{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:32Z","timestamp":1750220372799,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3450614.3464470","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T18:25:06Z","timestamp":1624386306000},"page":"368-370","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-preserving Biometric-driven Data for Student Identity Management: Challenges and Approaches"],"prefix":"10.1145","author":[{"given":"Christos","family":"Fidas","sequence":"first","affiliation":[{"name":"University of Patras, Greece"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"Cognitive UX GmbH, Germany"}]},{"given":"David","family":"Portugal","sequence":"additional","affiliation":[{"name":"University of Coimbra, Portugal"}]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[{"name":"University of Cyprus, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"189","volume-title":"Proc. SOUPS","author":"Mare S.","year":"2016","unstructured":"Mare , S. , Baker , M. , Gummeson , J. ( 2016 ). A Study of Authentication in Daily Life . In Proc. SOUPS 2016, 189 - 206 Mare, S., Baker, M., Gummeson, J. (2016). A Study of Authentication in Daily Life. In Proc. SOUPS 2016, 189-206"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010001"},{"key":"e_1_3_2_1_3_1","volume-title":"Sociocultural Experiences to Enhance Security in Cued-recall Graphical Authentication. International Journal of Human-Computer Studies, 149","author":"Constantinides A.","year":"2021","unstructured":"Constantinides , A. , Fidas , C. , Belk , M. , Pietron , A. , Han , T. , Pitsillides , A. ( 2021 ). From Hot-spots towards Experience-spots: Leveraging on Users \u2019 Sociocultural Experiences to Enhance Security in Cued-recall Graphical Authentication. International Journal of Human-Computer Studies, 149 Constantinides, A., Fidas, C., Belk, M., Pietron, A., Han, T., Pitsillides, A. (2021). From Hot-spots towards Experience-spots: Leveraging on Users\u2019 Sociocultural Experiences to Enhance Security in Cued-recall Graphical Authentication. International Journal of Human-Computer Studies, 149"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314023"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702252"},{"key":"e_1_3_2_1_6_1","volume-title":"Blockchain Based Access Control Systems: State of the Art and Challenges. ACM Web Intelligence, 423-428","author":"Rouhani S.","year":"2019","unstructured":"Rouhani , S. , Deters , R. ( 2019 ). Blockchain Based Access Control Systems: State of the Art and Challenges. ACM Web Intelligence, 423-428 Rouhani, S., Deters, R. (2019). Blockchain Based Access Control Systems: State of the Art and Challenges. ACM Web Intelligence, 423-428"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.12.013"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889996"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(20)30109-0"},{"key":"e_1_3_2_1_10_1","volume-title":"Biometrics in Schools: The Role of Authentic and Inauthentic Social Transactions. BSA Conference 2017","author":"Gray S.L.","year":"2017","unstructured":"Gray , S.L. ( 2017 ). Biometrics in Schools: The Role of Authentic and Inauthentic Social Transactions. BSA Conference 2017 Gray, S.L. (2017). Biometrics in Schools: The Role of Authentic and Inauthentic Social Transactions. BSA Conference 2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7129505"},{"key":"e_1_3_2_1_12_1","volume-title":"Article 24, 39","author":"Labati R.D.","year":"2016","unstructured":"Labati , R.D. , Genovese , A. , Mu\u00f1oz , E. , Piuri , V. , Scotti , F. , Sforza , G. ( 2016 ). Biometric Recognition in Automated Border Control: A Survey. ACM Computing Surveys, 49(2) , Article 24, 39 pages Labati, R.D., Genovese, A., Mu\u00f1oz, E., Piuri, V., Scotti, F., Sforza, G. (2016). Biometric Recognition in Automated Border Control: A Survey. ACM Computing Surveys, 49(2), Article 24, 39 pages"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2019.102805"},{"key":"e_1_3_2_1_15_1","volume-title":"Facenet: A Unified Embedding for Face Recognition and Clustering. IEEE Conference on Computer Vision and Pattern Recognition, 815-823","author":"Schroff F.","year":"2015","unstructured":"Schroff , F. , Kalenichenko , D. , Philbin , J. ( 2015 ). Facenet: A Unified Embedding for Face Recognition and Clustering. IEEE Conference on Computer Vision and Pattern Recognition, 815-823 Schroff, F., Kalenichenko, D., Philbin, J. (2015). Facenet: A Unified Embedding for Face Recognition and Clustering. IEEE Conference on Computer Vision and Pattern Recognition, 815-823"},{"key":"e_1_3_2_1_16_1","volume-title":"An Eye Gaze-driven Metric for Estimating the Strength of Graphical Passwords based on Image Hotspots. ACM Intelligent User Interfaces (IUI","author":"Constantinides A.","year":"2020","unstructured":"Constantinides , A. , Belk , M. , Fidas , C. , Pitsillides , A. ( 2020 ). An Eye Gaze-driven Metric for Estimating the Strength of Graphical Passwords based on Image Hotspots. ACM Intelligent User Interfaces (IUI 2020), ACM Press , 33-37 Constantinides, A., Belk, M., Fidas, C., Pitsillides, A. (2020). An Eye Gaze-driven Metric for Estimating the Strength of Graphical Passwords based on Image Hotspots. ACM Intelligent User Interfaces (IUI 2020), ACM Press, 33-37"},{"key":"e_1_3_2_1_17_1","volume-title":"On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM User Modeling, Adaptation and Personalization (UMAP","author":"Constantinides A.","year":"2019","unstructured":"Constantinides , A. , Belk , M. , Fidas , C. , Pitsillides , A. ( 2019 ). On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM User Modeling, Adaptation and Personalization (UMAP 2019), ACM Press , 245-249 Constantinides, A., Belk, M., Fidas, C., Pitsillides, A. (2019). On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM User Modeling, Adaptation and Personalization (UMAP 2019), ACM Press, 245-249"},{"key":"e_1_3_2_1_18_1","volume-title":"Voice Biometrics: Deep Learning-based Voiceprint Authentication System. System of Systems Engineering Conference, IEEE, 1-6","author":"Boles A.","year":"2017","unstructured":"Boles , A. , Rad , P. ( 2017 ). Voice Biometrics: Deep Learning-based Voiceprint Authentication System. System of Systems Engineering Conference, IEEE, 1-6 Boles, A., Rad, P. (2017). Voice Biometrics: Deep Learning-based Voiceprint Authentication System. System of Systems Engineering Conference, IEEE, 1-6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2019.101027"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2018.8639585"},{"key":"e_1_3_2_1_21_1","volume-title":"Computer Mouse Interaction. ACM Conference Extended Abstracts on Human Factors in Computing Systems, 1019-1024","author":"Belk M.","year":"2015","unstructured":"Belk , M. , Portugal , D. , Christodoulou , E. , Samaras , G. ( 2015 ). Cognimouse: On Detecting Users\u2019 Task Completion Difficulty through Computer Mouse Interaction. ACM Conference Extended Abstracts on Human Factors in Computing Systems, 1019-1024 Belk, M., Portugal, D., Christodoulou, E., Samaras, G. (2015). Cognimouse: On Detecting Users\u2019 Task Completion Difficulty through Computer Mouse Interaction. ACM Conference Extended Abstracts on Human Factors in Computing Systems, 1019-1024"},{"key":"e_1_3_2_1_22_1","volume-title":"Security and Privacy on Blockchain. ACM Computing Surveys, 52(3), article 51","author":"Zhang R.","year":"2019","unstructured":"Zhang , R. , Xue , R. , Liu , L. ( 2019 ). Security and Privacy on Blockchain. ACM Computing Surveys, 52(3), article 51 Zhang, R., Xue, R., Liu, L. (2019). Security and Privacy on Blockchain. ACM Computing Surveys, 52(3), article 51"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3053032"},{"key":"e_1_3_2_1_24_1","first-page":"254","volume-title":"Privacy Preserving Biometric Identification on the Bitcoin Blockchain. International Symposium on Cyberspace Safety and Security (CSS","author":"Sarier N.D.","year":"2018","unstructured":"Sarier , N.D. ( 2018 ). Privacy Preserving Biometric Identification on the Bitcoin Blockchain. International Symposium on Cyberspace Safety and Security (CSS 2018), 254 - 269 Sarier, N.D. (2018). Privacy Preserving Biometric Identification on the Bitcoin Blockchain. International Symposium on Cyberspace Safety and Security (CSS 2018), 254-269"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3068385"}],"event":{"name":"UMAP '21: 29th ACM Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Utrecht Netherlands","acronym":"UMAP '21"},"container-title":["Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450614.3464470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450614.3464470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:39Z","timestamp":1750191459000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450614.3464470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":25,"alternative-id":["10.1145\/3450614.3464470","10.1145\/3450614"],"URL":"https:\/\/doi.org\/10.1145\/3450614.3464470","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}