{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:27:16Z","timestamp":1776083236002,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["22K19782"],"award-info":[{"award-number":["22K19782"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617122","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"192-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["PinchKey: A Natural and User-Friendly Approach to VR User Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6479-4642","authenticated-orcid":false,"given":"Mei","family":"Suzuki","sequence":"first","affiliation":[{"name":"Waseda University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5766-0411","authenticated-orcid":false,"given":"Ryo","family":"Iijima","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Japan and Waseda University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2079-2711","authenticated-orcid":false,"given":"Kazuki","family":"Nomoto","sequence":"additional","affiliation":[{"name":"Waseda University, Japan and Deloitte Tohmatsu Cyber LLC, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-9394","authenticated-orcid":false,"given":"Tetsushi","family":"Ohki","sequence":"additional","affiliation":[{"name":"Shizuoka University, Japan and RIKEN AIP, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1583-4174","authenticated-orcid":false,"given":"Tatsuya","family":"Mori","sequence":"additional","affiliation":[{"name":"Waseda University, Japan and RIKEN AIP, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2537748"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Kyle\u00a0O Bailey James\u00a0S Okolica and Gilbert\u00a0L Peterson. 2014. User Identification and Authentication using Multi-Modal Behavioral Biometrics.","DOI":"10.1016\/j.cose.2014.03.005"},{"key":"e_1_3_2_1_3_1","volume-title":"SUS: A quick and dirty usability scale. Usability Eval. Ind. 189 (11","author":"Brooke John","year":"1995","unstructured":"John Brooke. 1995. SUS: A quick and dirty usability scale. Usability Eval. Ind. 189 (11 1995), 3\u20134."},{"key":"e_1_3_2_1_4_1","volume-title":"Signal Processing Based on Gesture Recognition System. In 2021 International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, 123\u2013126","author":"Chenge Dong","year":"2021","unstructured":"Dong Chenge, Zhao Xiao, He Jingxi, Wang Sitong, and Tian Pei. 2021. Signal Processing Based on Gesture Recognition System. In 2021 International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, 123\u2013126."},{"key":"e_1_3_2_1_5_1","unstructured":"Alibaba\u00a0Cloud Community. 2022. Alibaba Rolls Out Deeper Immersive Luxury Shopping Experience In The Metaverse. https:\/\/www.alibabacloud.com\/blog\/alibaba-rolls-out-deeper-immersive-luxury-shopping-experience-in-the-metaverse_599369."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546663"},{"key":"e_1_3_2_1_7_1","volume-title":"Virtual reality to become a $51bn market by","year":"2030","unstructured":"GlobalData. 2023. Virtual reality to become a $51bn market by 2030, but is still chasing mainstream appeal, says GlobalData. https:\/\/www.globaldata.com\/media\/thematic-research\/virtual-reality-become-51bn-market-2030-still-chasing-mainstream-appeal-says-globaldata\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5220\/0010425807710780"},{"key":"e_1_3_2_1_9_1","unstructured":"ISO. 2018. ISO 9241-11:2018 Ergonomics of human-system interaction \u2014 Part 11: Usability: Definitions and concepts. https:\/\/www.iso.org\/standard\/63500.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Sauro Jeff. 2011. A Practical Guide to the System Usability Scale: Background Benchmarks & Best Practices. Measuring Usability LLC."},{"key":"e_1_3_2_1_11_1","unstructured":"[11] Jupyter. 2021. https:\/\/jupyter.org\/."},{"key":"e_1_3_2_1_12_1","volume-title":"MultiMedia Modeling(Lecture Notes in Computer Science)","author":"Kupin Alexander","unstructured":"Alexander Kupin, Benjamin Moeller, Yijun Jiang, Natasha\u00a0Kholgade Banerjee, and Sean Banerjee. 2018. Task-Driven Biometric Authentication of Users in Virtual Reality (VR) Environments. In MultiMedia Modeling(Lecture Notes in Computer Science). Springer International Publishing, Cham, 55\u201367."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103120"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24079"},{"key":"e_1_3_2_1_15_1","volume-title":"Knowledge-driven Biometric Authentication in Virtual Reality. In Extended Abstracts of the 2020 CHI Conference on human factors in computing systems(CHI EA \u201920)","author":"Mathis Florian","year":"2020","unstructured":"Florian Mathis, Hassan Fawaz, and Mohamed Khamis. 2020. Knowledge-driven Biometric Authentication in Virtual Reality. In Extended Abstracts of the 2020 CHI Conference on human factors in computing systems(CHI EA \u201920). ACM, 1\u201310."},{"key":"e_1_3_2_1_16_1","unstructured":"Audi MediaCenter. 2020. Audi e-tron Sportback conquers the virtual world. https:\/\/www.audi-mediacenter.com\/en\/press-releases\/audi-e-tron-sportback-conquers-the-virtual-world-12766."},{"key":"e_1_3_2_1_17_1","unstructured":"Meta. 2022. Getting started with Hand Tracking on Meta Quest headsets. https:\/\/www.meta.com\/help\/quest\/articles\/headsets-and-accessories\/controllers-and-hand-tracking\/hand-tracking-quest-2\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Meta. 2023. Meta Quest 2. https:\/\/www.meta.com\/jp\/en\/quest\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Meta. 2023. Meta Quest Pro. https:\/\/www.meta.com\/jp\/en\/quest\/quest-pro\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20102944"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385378.3385385"},{"key":"e_1_3_2_1_22_1","volume-title":"SHARE & TRENDS ANALYSIS - GLOBAL OPPORTUNITY ANALYSIS AND INDUSTRY FORECAST","author":"REPORTOCEAN.","year":"2022","unstructured":"REPORTOCEAN. 2022. BIOMETRIC SENSORS MARKET SIZE, SHARE & TRENDS ANALYSIS - GLOBAL OPPORTUNITY ANALYSIS AND INDUSTRY FORECAST 2030. https:\/\/reportocean.com\/industry-verticals\/details?report_id=BWCC786&cat_title=Information%20&%20Communications%20Technology."},{"key":"e_1_3_2_1_23_1","volume-title":"Arm movement activity based user authentication in P2P systems. Peer-to-peer networking and applications 13, 2","author":"Shin Jungpil","year":"2019","unstructured":"Jungpil Shin, Md\u00a0Rashedul Islam, Md\u00a0Abdur Rahim, and Hyung-Jin Mun. 2019. Arm movement activity based user authentication in P2P systems. Peer-to-peer networking and applications 13, 2 (2019), 635\u2013646."},{"key":"e_1_3_2_1_24_1","unstructured":"SONY. 2023. PlayStation VR. https:\/\/www.playstation.com\/en-us\/ps-vr\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_2_1_26_1","unstructured":"[26] The MathWorks Inc. 2020. https:\/\/www.mathworks.com\/products\/new_products\/release2020a.html."},{"key":"e_1_3_2_1_27_1","volume-title":"https:\/\/unity.com\/releases\/editor","year":"2020","unstructured":"[27] unity. 2021. https:\/\/unity.com\/releases\/editor\/whats-new\/2020.3.0."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0639"},{"key":"e_1_3_2_1_29_1","unstructured":"VIVE. 2023. Vive Focus 3. https:\/\/www.vive.com\/us\/product\/vive-focus3\/."},{"key":"e_1_3_2_1_30_1","unstructured":"VIVE. 2023. Vive Focus Plus. https:\/\/business.vive.com\/eu\/product\/focus-plus\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Advances in Information and Communication Networks","author":"Zhao Jinghao","unstructured":"Jinghao Zhao and Jiro Tanaka. 2018. Hand Gesture Authentication Using Depth Camera. In Advances in Information and Communication Networks. Springer International Publishing, Cham, 641\u2013654."}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","location":"Copenhagen Denmark","acronym":"EuroUSEC 2023"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":31,"alternative-id":["10.1145\/3617072.3617122","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617122","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}