{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:18:52Z","timestamp":1776104332435,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100009318","name":"Helmholtz Association","doi-asserted-by":"publisher","award":["46.23.01"],"award-info":[{"award-number":["46.23.01"]}],"id":[{"id":"10.13039\/501100009318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1145\/3546155.3546663","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T15:50:12Z","timestamp":1664207412000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Shoulder-Surfing Resistant Authentication for Augmented Reality"],"prefix":"10.1145","author":[{"given":"Reyhan","family":"D\u00fczg\u00fcn","sequence":"first","affiliation":[{"name":"SECUSO, Karlsruhe Institute of Technology, Germany"}]},{"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[{"name":"SECUSO, Karlsruhe Institute of Technology, Germany"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"SECUSO, Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131904"},{"key":"e_1_3_2_1_2_1","volume-title":"Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer","author":"Bailey V","year":"2014","unstructured":"Daniel\u00a0 V Bailey , Markus D\u00fcrmuth , and Christof Paar . 2014 . \u201c Typing\u201d passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer , Citeseer, CA, USA, 1\u20132. Daniel\u00a0V Bailey, Markus D\u00fcrmuth, and Christof Paar. 2014. \u201cTyping\u201d passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer, Citeseer, CA, USA, 1\u20132."},{"key":"e_1_3_2_1_3_1","volume-title":"\u201cquick and dirty\u2019usability. Usability evaluation in industry 189, 3","author":"Brooke John","year":"1996","unstructured":"John Brooke . 1996. Sus: a \u201cquick and dirty\u2019usability. Usability evaluation in industry 189, 3 ( 1996 ), 189\u2013194. John Brooke. 1996. Sus: a \u201cquick and dirty\u2019usability. Usability evaluation in industry 189, 3 (1996), 189\u2013194."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX security symposium, Vol.\u00a013","author":"Davis Darren","unstructured":"Darren Davis , Fabian Monrose , and Michael\u00a0 K Reiter . 2004. On user choice in graphical password schemes .. In USENIX security symposium, Vol.\u00a013 . USENIX Association , USA , 11\u201311. Darren Davis, Fabian Monrose, and Michael\u00a0K Reiter. 2004. On user choice in graphical password schemes.. In USENIX security symposium, Vol.\u00a013. USENIX Association, USA, 11\u201311."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_7_1","volume-title":"WAY Workshop. WAY, Virtual, 1\u20136.","author":"Duezguen Reyhan","year":"2020","unstructured":"Reyhan Duezguen , Peter Mayer , Sanchari Das , and Melanie Volkamer . 2020 . Towards secure and usable authentication for augmented and virtual reality head-mounted displays . In WAY Workshop. WAY, Virtual, 1\u20136. Reyhan Duezguen, Peter Mayer, Sanchari Das, and Melanie Volkamer. 2020. Towards secure and usable authentication for augmented and virtual reality head-mounted displays. In WAY Workshop. WAY, Virtual, 1\u20136."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Advances in Mobile Computing & Multimedia. ACM, NY, USA, 107\u2013116","author":"Findling Rainhard\u00a0Dieter","year":"2019","unstructured":"Rainhard\u00a0Dieter Findling , Tahmid Quddus , and Stephan Sigg . 2019 . Hide my gaze with EOG! towards closed-eye gaze gesture passwords that resist observation-attacks with electrooculography in smart glasses . In International Conference on Advances in Mobile Computing & Multimedia. ACM, NY, USA, 107\u2013116 . Rainhard\u00a0Dieter Findling, Tahmid Quddus, and Stephan Sigg. 2019. Hide my gaze with EOG! towards closed-eye gaze gesture passwords that resist observation-attacks with electrooculography in smart glasses. In International Conference on Advances in Mobile Computing & Multimedia. ACM, NY, USA, 107\u2013116."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365921.3365928"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312959"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2016.7529679"},{"key":"e_1_3_2_1_13_1","volume-title":"Extended Abstracts of the 2019 CHI. ACM","author":"Hadjidemetriou George","unstructured":"George Hadjidemetriou , Marios Belk , Christos Fidas , and Andreas Pitsillides . 2019. Picture passwords in mixed reality: Implementation and evaluation . In Extended Abstracts of the 2019 CHI. ACM , NY , USA , 1\u20136. George Hadjidemetriou, Marios Belk, Christos Fidas, and Andreas Pitsillides. 2019. Picture passwords in mixed reality: Implementation and evaluation. In Extended Abstracts of the 2019 CHI. ACM, NY, USA, 1\u20136."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076754"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196543"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174910.3174936"},{"key":"e_1_3_2_1_17_1","volume-title":"The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality Wearable: An Initial Proof of Concept","author":"Kreider Christopher","unstructured":"Christopher Kreider . 2018. The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality Wearable: An Initial Proof of Concept . In Southern Association for Information Systems . AISeL, UK, 1\u20136. Christopher Kreider. 2018. The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality Wearable: An Initial Proof of Concept. In Southern Association for Information Systems. AISeL, UK, 1\u20136."},{"key":"e_1_3_2_1_18_1","volume-title":"Item benchmarks for the system usability scale.Journal of Usability Studies 13, 3","author":"Lewis R","year":"2018","unstructured":"James\u00a0 R Lewis and Jeff Sauro . 2018. Item benchmarks for the system usability scale.Journal of Usability Studies 13, 3 ( 2018 ), 158\u2013167. James\u00a0R Lewis and Jeff Sauro. 2018. Item benchmarks for the system usability scale.Journal of Usability Studies 13, 3 (2018), 158\u2013167."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013212"},{"key":"e_1_3_2_1_20_1","volume-title":"Leakage Resilient Password Systems","author":"Li Yingjiu","unstructured":"Yingjiu Li , Qiang Yan , and Robert\u00a0 H Deng . 2015. ShadowKey: A Practical Leakage Resilient Password System . In Leakage Resilient Password Systems . Springer , Cham , 53\u201364. Yingjiu Li, Qiang Yan, and Robert\u00a0H Deng. 2015. ShadowKey: A Practical Leakage Resilient Password System. In Leakage Resilient Password Systems. Springer, Cham, 53\u201364."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122840"},{"key":"e_1_3_2_1_22_1","volume-title":"STAST. ACM","author":"Mayer Peter","unstructured":"Peter Mayer and Melanie Volkamer . 2018. Addressing misconceptions about password security effectively . In STAST. ACM , NY , USA , 16\u201327. Peter Mayer and Melanie Volkamer. 2018. Addressing misconceptions about password security effectively. In STAST. ACM, NY, USA, 16\u201327."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005252"},{"key":"e_1_3_2_1_26_1","volume-title":"Picture superiority in free recall: Imagery or dual coding?Cognitive psychology 5, 2","author":"Paivio Allan","year":"1973","unstructured":"Allan Paivio and Kalman Csapo . 1973. Picture superiority in free recall: Imagery or dual coding?Cognitive psychology 5, 2 ( 1973 ), 176\u2013206. Allan Paivio and Kalman Csapo. 1973. Picture superiority in free recall: Imagery or dual coding?Cognitive psychology 5, 2 (1973), 176\u2013206."},{"key":"e_1_3_2_1_27_1","volume-title":"Why are pictures easier to recall than words?Psychonomic Science 11, 4","author":"Paivio Allan","year":"1968","unstructured":"Allan Paivio , Timothy\u00a0 B Rogers , and Padric\u00a0 C Smythe . 1968. Why are pictures easier to recall than words?Psychonomic Science 11, 4 ( 1968 ), 137\u2013138. Allan Paivio, Timothy\u00a0B Rogers, and Padric\u00a0C Smythe. 1968. Why are pictures easier to recall than words?Psychonomic Science 11, 4 (1968), 137\u2013138."},{"key":"e_1_3_2_1_28_1","volume-title":"Systematic review and meta-analysis of augmented reality in medicine, retail, and games. Visual computing for industry, biomedicine, and art 3, 1","author":"Parekh Pranav","year":"2020","unstructured":"Pranav Parekh , Shireen Patel , Nivedita Patel , and Manan Shah . 2020. Systematic review and meta-analysis of augmented reality in medicine, retail, and games. Visual computing for industry, biomedicine, and art 3, 1 ( 2020 ), 1\u201320. Pranav Parekh, Shireen Patel, Nivedita Patel, and Manan Shah. 2020. Systematic review and meta-analysis of augmented reality in medicine, retail, and games. Visual computing for industry, biomedicine, and art 3, 1 (2020), 1\u201320."},{"key":"e_1_3_2_1_29_1","volume-title":"Review of Microsoft HoloLens Applications over the Past Five Years. Applied Sciences 11, 16 (Jan","author":"Park Sebeom","year":"2021","unstructured":"Sebeom Park , Shokhrukh Bokijonov , and Yosoon Choi . 2021. Review of Microsoft HoloLens Applications over the Past Five Years. Applied Sciences 11, 16 (Jan . 2021 ), 7259. Number : 16 Publisher : Multidisciplinary Digital Publishing Institute . Sebeom Park, Shokhrukh Bokijonov, and Yosoon Choi. 2021. Review of Microsoft HoloLens Applications over the Past Five Years. Applied Sciences 11, 16 (Jan. 2021), 7259. Number: 16 Publisher: Multidisciplinary Digital Publishing Institute."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60922-5_30"},{"key":"e_1_3_2_1_31_1","first-page":"160","article-title":"Personal identification number entry for Google glass","volume":"63","author":"Seo Hwajeong","year":"2017","unstructured":"Hwajeong Seo , Jiye Kim , Howon Kim , and Zhe Liu . 2017 . Personal identification number entry for Google glass . C&EE 63 (2017), 160 \u2013 167 . Hwajeong Seo, Jiye Kim, Howon Kim, and Zhe Liu. 2017. Personal identification number entry for Google glass. C&EE 63(2017), 160\u2013167.","journal-title":"C&EE"},{"key":"e_1_3_2_1_32_1","volume-title":"CHI\u201904 extended abstracts on Human factors in computing systems","author":"Weinshall Daphna","unstructured":"Daphna Weinshall and Scott Kirkpatrick . 2004. Passwords you\u2019ll never forget, but can\u2019t recall . In CHI\u201904 extended abstracts on Human factors in computing systems . ACM , New York, NY, USA , 1399\u20131402. Daphna Weinshall and Scott Kirkpatrick. 2004. Passwords you\u2019ll never forget, but can\u2019t recall. In CHI\u201904 extended abstracts on Human factors in computing systems. ACM, New York, NY, USA, 1399\u20131402."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Oliver Wiese and Volker Roth. 2016. See you next time: A model for modern shoulder surfers. In MobileHCI. ACM Florence Italy 453\u2013464.  Oliver Wiese and Volker Roth. 2016. See you next time: A model for modern shoulder surfers. In MobileHCI. ACM Florence Italy 453\u2013464.","DOI":"10.1145\/2935334.2935388"},{"key":"e_1_3_2_1_34_1","volume-title":"Aditi Roy, and Nasir Memon.","author":"Yadav Dhruv\u00a0Kumar","year":"2015","unstructured":"Dhruv\u00a0Kumar Yadav , Beatrice Ionascu , Sai Vamsi\u00a0Krishna Ongole , Aditi Roy, and Nasir Memon. 2015 . Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass. In FC. Springer , Germany, 281\u2013297. Dhruv\u00a0Kumar Yadav, Beatrice Ionascu, Sai Vamsi\u00a0Krishna Ongole, Aditi Roy, and Nasir Memon. 2015. Design and analysis of shoulder surfing resistant pin based authentication mechanisms on google glass. In FC. Springer, Germany, 281\u2013297."},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Computer Communications. IEEE, CA, USA, 1\u20139.","author":"Yi Shanhe","year":"2016","unstructured":"Shanhe Yi , Zhengrui Qin , Ed Novak , Yafeng Yin , and Qun Li . 2016 . Glassgesture: Exploring head gesture interface of smart glasses . In International Conference on Computer Communications. IEEE, CA, USA, 1\u20139. Shanhe Yi, Zhengrui Qin, Ed Novak, Yafeng Yin, and Qun Li. 2016. Glassgesture: Exploring head gesture interface of smart glasses. In International Conference on Computer Communications. IEEE, CA, USA, 1\u20139."},{"key":"e_1_3_2_1_36_1","volume-title":"AugAuth: Shoulder-surfing resistant authentication for augmented reality","author":"Zhang Ruide","unstructured":"Ruide Zhang , Ning Zhang , Changlai Du , Wenjing Lou , Y\u00a0Thomas Hou , and Yuichi Kawamoto . 2017. AugAuth: Shoulder-surfing resistant authentication for augmented reality . In ICC. IEEE , Paris, France , 1\u20136. Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y\u00a0Thomas Hou, and Yuichi Kawamoto. 2017. AugAuth: Shoulder-surfing resistant authentication for augmented reality. In ICC. IEEE, Paris, France, 1\u20136."}],"event":{"name":"NordiCHI '22: Nordic Human-Computer Interaction Conference","location":"Aarhus Denmark","acronym":"NordiCHI '22"},"container-title":["Nordic Human-Computer Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546155.3546663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546155.3546663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:29Z","timestamp":1750183829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546155.3546663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":36,"alternative-id":["10.1145\/3546155.3546663","10.1145\/3546155"],"URL":"https:\/\/doi.org\/10.1145\/3546155.3546663","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]},"assertion":[{"value":"2022-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}