{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:27:19Z","timestamp":1776083239187,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":154,"publisher":"ACM","funder":[{"name":"German Research Foundation","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]},{"name":"VolkswagenStiftung Nieders\u00e4chsisches Vorab","award":["ZN3695"],"award-info":[{"award-number":["ZN3695"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1145\/3756884.3766016","type":"proceedings-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T07:52:48Z","timestamp":1764921168000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Secure and Usable XR Authentication Schemes for Head-Mounted Displays: A Co-Creation Study with Experts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1244-7822","authenticated-orcid":false,"given":"Reyhan","family":"D\u00fczg\u00fcn","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8829-6074","authenticated-orcid":false,"given":"Philip","family":"Klostermeyer","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2920-7083","authenticated-orcid":false,"given":"Lena","family":"Swienty","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5644-3316","authenticated-orcid":false,"given":"Sascha","family":"Fahl","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,12,4]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531092"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR50410.2021.00081"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Reem AlHusain and Ali Alkhalifah. 2021. Evaluating fallback authentication research: a systematic literature review. Computers & Security 111 (2021) 102487.","DOI":"10.1016\/j.cose.2021.102487"},{"key":"e_1_3_3_3_5_2","unstructured":"Anupama Ambika Hyunju Shin and Varsha Jain. 2023. Immersive technologies and consumer behavior: A systematic review of two decades of research. Australian Journal of Management (2023) 03128962231181429."},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"crossref","unstructured":"Ioanna Anastasaki George Drosatos George Pavlidis and Konstantinos Rantos. 2023. User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review. Information 14 10 (2023) 538.","DOI":"10.3390\/info14100538"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3516809"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173759"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320473"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Mozhgan Azimpourkivi Umut Topkara and Bogdan Carbunar. 2017. Camera based two factor authentication through mobile and wearable devices. Interactive Mobile Wearable and Ubiquitous Technologies 1 3 (2017) 1\u201337.","DOI":"10.1145\/3131904"},{"key":"e_1_3_3_3_11_2","first-page":"1","volume-title":"Proc. of the Symposium on Usable Privacy and Security","author":"Bailey Daniel\u00a0V","year":"2014","unstructured":"Daniel\u00a0V Bailey, Markus D\u00fcrmuth, and Christof Paar. 2014. \u201cTyping\u201d passwords with voice recognition: How to authenticate to Google Glass. In Proc. of the Symposium on Usable Privacy and Security. Citeseer, Citeseer, CA, USA, 1\u20132."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Leif\u00a0P Berg and Judy\u00a0M Vance. 2017. Industry use of virtual reality in product design and manufacturing: a survey. Virtual Reality 21 (2017) 1\u201317.","DOI":"10.1007\/s10055-016-0293-9"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3457339.3457983"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Mark Billinghurst Raphael Grasset and Julian Looser. 2005. Designing augmented reality interfaces. ACM Siggraph Computer Graphics 39 1 (2005) 17\u201322.","DOI":"10.1145\/1057792.1057803"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00313"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION45008.2020.9190282"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304919"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107939"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Polona Caserman Augusto Garcia-Agundez Robert Konrad Stefan G\u00f6bel and Ralf Steinmetz. 2019. Real-time body tracking in virtual reality using a Vive tracker. Virtual Reality 23 (2019) 155\u2013168.","DOI":"10.1007\/s10055-018-0374-z"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_22"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39555-5_35"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8446494"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Shu-Yu Chen Yu-Kun Lai Shihong Xia Paul Rosin and Lin Gao. 2022. 3D face reconstruction and gaze tracking in the HMD for virtual interaction. IEEE Transactions on Multimedia (2022).","DOI":"10.1109\/TMM.2022.3156820"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","unstructured":"Taizhou Chen Lantian Xu Xianshan Xu and Kening Zhu. 2021. GestOnHMD: Enabling Gesture-based Interaction on Low-cost VR Head-Mounted Display. IEEE Transactions on Visualization and Computer Graphics 27 5 (May 2021) 2597\u20132607. 10.1109\/TVCG.2021.3067689","DOI":"10.1109\/TVCG.2021.3067689"},{"key":"e_1_3_3_3_27_2","unstructured":"W.\u00a0X. Chen X.\u00a0Y. Cui J. Zheng J.\u00a0M. Zhang S. Chen and Y.\u00a0D. Yao. 2019. Gaze Gestures and Their Applications in human-computer interaction with a head-mounted display. http:\/\/arxiv.org\/abs\/1910.07428"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445441"},{"key":"e_1_3_3_3_29_2","unstructured":"Yang-Wai Chow. 2009. Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in Head-Mounted Display Virtual Reality. International Journal of Recent Trends in Engineering 1 1 (2009)."},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502042"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174030"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765982"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Heather Crawford and Karen Renaud. 2014. Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management 1 (2014) 1\u201328.","DOI":"10.1186\/2196-064X-1-7"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"crossref","unstructured":"Dimitrios Damopoulos and Georgios Kambourakis. 2019. Hands-Free one-Time and continuous authentication using glass wearable devices. Journal of Information Security and Applications 46 (2019) 138\u2013150.","DOI":"10.1016\/j.jisa.2019.02.002"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376628"},{"key":"e_1_3_3_3_36_2","first-page":"1","volume-title":"WAY Workshop","author":"D\u00fczg\u00fcn Reyhan","year":"2020","unstructured":"Reyhan D\u00fczg\u00fcn, Peter Mayer, Sanchari Das, and Melanie Volkamer. 2020. Towards secure and usable authentication for augmented and virtual reality head-mounted displays. In WAY Workshop. WAY, Virtual, 1\u20136."},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546663"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3539011"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","unstructured":"Reyhan D\u00fczg\u00fcn Philip Klostermeyer Lena Swienty Sascha Fahl and Karola Marky. 2025. Supplemental Material & Replication: Exploring Novel Authentication Schemes in XR. 10.17605\/OSF.IO\/NKQZ9. Updated: 2025-09-14.","DOI":"10.17605\/OSF.IO\/NKQZ9"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3472749.3474738"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Habiba Farzand Melvin Abraham Stephen Brewster Mohamed Khamis and Karola Marky. 2025. A systematic deconstruction of human-centric privacy & security threats on mobile phones. International Journal of Human\u2013Computer Interaction 41 2 (2025) 1628\u20131651.","DOI":"10.1080\/10447318.2024.2361519"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365921.3365922"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365921.3365928"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29390-1_16"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312959"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2995289.2995295"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301019.3325158"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312847"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58465-8_5"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8797862"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00315"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984576"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","unstructured":"Jonathan Gurary Ye Zhu and Huirong Fu. 2017. Leveraging 3D Benefits for Authentication. International Journal of Communications Network and System Sciences 10 8 (Aug. 2017) 324\u2013338. 10.4236\/ijcns.2017.108B035","DOI":"10.4236\/ijcns.2017.108B035"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313076"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","unstructured":"Louisa Hallal Jason Rhinelander and Ramesh Venkat. 2024. Recent Trends of Authentication Methods in Extended Reality: A Survey. Applied System Innovation 7 3 (June 2024) 45. 10.3390\/asi7030045","DOI":"10.3390\/asi7030045"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"crossref","unstructured":"Ayah Hamad and Bochen Jia. 2022. How virtual reality technology has changed our lives: an overview of the current and potential applications and limitations. International journal of environmental research and public health 19 18 (2022) 11278.","DOI":"10.3390\/ijerph191811278"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3206343.3206344"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/1027933.1027944"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICONAT57137.2023.10080713"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Natalie Hube Mathias M\u00fcller Esther Lapczyna and Jan Wojdziak. 2020. Mixed reality based collaboration for design processes. i-com 19 2 (2020) 123\u2013137.","DOI":"10.1515\/icom-2020-0012"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196543"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3174910.3174936"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3013971.3013987"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_16"},{"key":"e_1_3_3_3_66_2","unstructured":"Katie Jones. [n. d.]. How to Run a Design Jam. https:\/\/medium.com\/ucimhcid\/how-to-run-a-design-jam-b3c0f416cb2e. Accessed: 2024-09-01."},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"crossref","unstructured":"Kande Kazadi Annouk Lievens and Dominik Mahr. 2016. Stakeholder co-creation during the innovation process: Identifying capabilities for knowledge creation among multiple stakeholders. Journal of business research 69 2 (2016) 525\u2013540.","DOI":"10.1016\/j.jbusres.2015.05.009"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3206505.3206522"},{"key":"e_1_3_3_3_69_2","first-page":"47","volume-title":"Global Journal of Computer Science and Technology","author":"Khare Akhil","year":"2012","unstructured":"Akhil Khare, Vinaya Kulkarni, and Akhilesh Upadhayay. 2012. A Collaborative Augmented Reality System Based On Real Time Hand Gesture Recognition. In Global Journal of Computer Science and Technology. Global Journals, US, 47\u201351."},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2018.00039"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/2659766.2659781"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331713"},{"key":"e_1_3_3_3_73_2","first-page":"1","volume-title":"Southern Association for Information Systems","author":"Kreider Christopher","year":"2018","unstructured":"Christopher Kreider. 2018. The Discoverability of Password Entry Using Virtual Keyboards in an Augmented Reality Wearable: An Initial Proof of Concept. In Southern Association for Information Systems. AISeL, UK, 1\u20136."},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548252"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173655"},{"key":"e_1_3_3_3_76_2","unstructured":"Tobias L\u00e4nge Philipp Matheis Reyhan D\u00fczg\u00fcn Peter Mayer and Melanie Volkamer. 2022. PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren f\u00fcr Virtual Reality Head-Mounted Displays."},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2024.23092"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops48775.2020.9156171"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607209"},{"key":"e_1_3_3_3_80_2","unstructured":"Mingjun Li Natasha\u00a0Kholgade Banerjee and Sean Banerjee. 2024. Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication. http:\/\/arxiv.org\/abs\/2401.16649"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSE\/EUC.2019.00031"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"crossref","unstructured":"Yan Li Yao Cheng Weizhi Meng Yingjiu Li and Robert\u00a0H Deng. 2021. Designing leakage-resilient password entry on head-mounted smart wearable glass devices. IEEE Transactions on Information Forensics and Security 16 (2021) 307\u2013321.","DOI":"10.1109\/TIFS.2020.3013212"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17503-4_3"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"crossref","unstructured":"Yung-Hui Li and Po-Jen Huang. 2017. An accurate and efficient user authentication mechanism on smart glasses based on iris recognition. Mobile Information Systems 2017 1 (2017) 1281020.","DOI":"10.1155\/2017\/1281020"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","unstructured":"Jonathan Liebers Sascha Brockel Uwe Gruenefeld and Stefan Schneegass. 2022. Identifying Users by Their Hand Tracking Data in Augmented and Virtual Reality. International Journal of Human\u2013Computer Interaction 40 2 (Jan. 2022) 409\u2013424. 10.1080\/10447318.2022.2120845","DOI":"10.1080\/10447318.2022.2120845"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611659.3615696"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642471"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3594738.3611355"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"publisher","unstructured":"Thiago Gomes\u00a0De Lima Sisse Gr\u00f8n Ole Broberg and Francisco De\u00a0Assis Esteves. 2023. Virtual Co-creation Workshop: Collaboration Design for Place Innovation. Link\u00f6ping Electronic Conference Proceedings (2023). 10.3384\/ecp203004","DOI":"10.3384\/ecp203004"},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"crossref","unstructured":"Feng Lin Kun\u00a0Woo Cho Chen Song Zhanpeng Jin and Wenyao Xu. 2019. Exploring a brain-based cancelable biometrics for smart headwear: Concept implementation and evaluation. IEEE Transactions on Mobile Computing 19 12 (2019) 2774\u20132792.","DOI":"10.1109\/TMC.2019.2936559"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"crossref","unstructured":"Dillon Lohr Michael\u00a0J. Proulx and Oleg Komogortsev. 2024. Establishing a Baseline for Gaze-driven Authentication Performance in VR: A Breadth-First Investigation on a Very Large Dataset. http:\/\/arxiv.org\/abs\/2404.11798","DOI":"10.1109\/IJCB62174.2024.10744483"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00208"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/3DUI.2014.6798834"},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24079"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"publisher","unstructured":"Karola Marky Kirill Ragozin George Chernyshov Andrii Matviienko Martin Schmitz Max M\u00fchlh\u00e4user Chloe Eghtebas and Kai Kunze. 2022. \u201cNah it\u2019s just annoying!\u201d A Deep Dive into User Perceptions of Two-Factor Authentication. ACM Trans. Comput.-Hum. Interact. 29 5 Article 43 (Oct. 2022) 32\u00a0pages. 10.1145\/3503514","DOI":"10.1145\/3503514"},{"key":"e_1_3_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-21308-4_42"},{"key":"e_1_3_3_3_98_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702382"},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00098"},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM60985.2024.00023"},{"key":"e_1_3_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW50115.2020.00070"},{"key":"e_1_3_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300815"},{"key":"e_1_3_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300707"},{"key":"e_1_3_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180450"},{"key":"e_1_3_3_3_106_2","first-page":"895","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Nair Vivek","year":"2023","unstructured":"Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James\u00a0F O\u2019Brien, Louis Rosenberg, and Dawn Song. 2023. Unique identification of 50,000+ virtual reality users from head & hand motion data. In 32nd USENIX Security Symposium (USENIX Security 23). 895\u2013910."},{"key":"e_1_3_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2003.1240730"},{"key":"e_1_3_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005252"},{"key":"e_1_3_3_3_109_2","doi-asserted-by":"crossref","unstructured":"Pranav Parekh Shireen Patel Nivedita Patel and Manan Shah. 2020. Systematic review and meta-analysis of augmented reality in medicine retail and games. Visual computing for industry biomedicine and art 3 (2020) 1\u201320.","DOI":"10.1186\/s42492-020-00057-7"},{"key":"e_1_3_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2018.8311460"},{"key":"e_1_3_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_3_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/3131277.3132180"},{"key":"e_1_3_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359996.3364264"},{"key":"e_1_3_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60922-5_30"},{"key":"e_1_3_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2014.6948411"},{"key":"e_1_3_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/3DUI.2017.7893315"},{"key":"e_1_3_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86586-3_11"},{"key":"e_1_3_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW62533.2024.00009"},{"key":"e_1_3_3_3_119_2","first-page":"357","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 357\u2013370."},{"key":"e_1_3_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54776-8_16"},{"key":"e_1_3_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983310.2985747"},{"key":"e_1_3_3_3_122_2","doi-asserted-by":"crossref","unstructured":"Kunhee Ryu Joong-Jae Lee and Jung-Min Park. 2019. GG Interaction: a gaze\u2013grasp pose interaction for 3D virtual object selection. Journal on Multimodal User Interfaces 13 4 (2019) 383\u2013393.","DOI":"10.1007\/s12193-019-00305-y"},{"key":"e_1_3_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_3_3_3_124_2","doi-asserted-by":"crossref","unstructured":"Yiran Shen Hongkai Wen Chengwen Luo Weitao Xu Tao Zhang Wen Hu and Daniela Rus. 2018. GaitLock: Protect virtual and augmented reality headsets using gait. IEEE Transactions on Dependable and Secure Computing 16 3 (2018) 484\u2013497.","DOI":"10.1109\/TDSC.2018.2800048"},{"key":"e_1_3_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379155.3391312"},{"key":"e_1_3_3_3_126_2","first-page":"159","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Slocum Carter","year":"2023","unstructured":"Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, and Jiasi Chen. 2023. Going through the motions:{ AR\/VR} keylogging from user head motions. In 32nd USENIX Security Symposium (USENIX Security 23). 159\u2013174."},{"key":"e_1_3_3_3_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833742"},{"key":"e_1_3_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300243"},{"key":"e_1_3_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332443"},{"key":"e_1_3_3_3_130_2","unstructured":"Justus Thies Michael Zollh\u00f6fer Marc Stamminger Christian Theobalt and Matthias Nie\u00dfner. 2016. Facevr: Real-time facial reenactment and eye gaze control in virtual reality. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1610.03151 (2016)."},{"key":"e_1_3_3_3_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713572"},{"key":"e_1_3_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347946"},{"key":"e_1_3_3_3_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00316"},{"key":"e_1_3_3_3_134_2","doi-asserted-by":"crossref","unstructured":"Viktor Varkarakis Shabab Bazrafkan and Peter Corcoran. 2020. Deep neural network and data augmentation methodology for off-axis iris segmentation in wearable headsets. Neural Networks 121 (2020) 101\u2013121.","DOI":"10.1016\/j.neunet.2019.07.020"},{"key":"e_1_3_3_3_135_2","doi-asserted-by":"crossref","unstructured":"Mirela-Catrinel Voicu Nicoleta S\u00eerghi and Daniela Maria-Magdalena Toth. 2023. Consumers\u2019 experience and satisfaction using augmented reality apps in E-shopping: New empirical evidence. Applied Sciences 13 17 (2023) 9596.","DOI":"10.3390\/app13179596"},{"key":"e_1_3_3_3_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322334"},{"key":"e_1_3_3_3_137_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78642-7_61"},{"key":"e_1_3_3_3_138_2","doi-asserted-by":"publisher","unstructured":"Jiawei Wang BoYu Gao Huawei Tu Hai-Ning Liang Zitao Liu Weiqi Luo and Jian Weng. 2023. Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality. International Journal of Human-Computer Interaction (June 2023) 1\u201319. 10.1080\/10447318.2023.2217608","DOI":"10.1080\/10447318.2023.2217608"},{"key":"e_1_3_3_3_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134629"},{"key":"e_1_3_3_3_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8448289"},{"key":"e_1_3_3_3_141_2","doi-asserted-by":"crossref","unstructured":"Robert Xiao Julia Schwarz Nick Throm Andrew\u00a0D Wilson and Hrvoje Benko. 2018. MRTouch: Adding touch input to head-mounted mixed reality. IEEE Transactions on Visualization and Computer Graphics 24 4 (2018) 1653\u20131660.","DOI":"10.1109\/TVCG.2018.2794222"},{"key":"e_1_3_3_3_142_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300674"},{"key":"e_1_3_3_3_143_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_21"},{"key":"e_1_3_3_3_144_2","doi-asserted-by":"publisher","DOI":"10.1145\/3393527.3393551"},{"key":"e_1_3_3_3_145_2","doi-asserted-by":"crossref","unstructured":"Wenhao Yang Xiwen Dengxiong Xueting Wang Yidan Hu and Yunbo Zhang. 2024. \u201ci can see your password\u201d: A case study about cybersecurity risks in mid-air interactions of mixed reality-based smart manufacturing applications. Journal of Computing and Information Science in Engineering 24 3 (2024) 031004.","DOI":"10.1115\/1.4062658"},{"key":"e_1_3_3_3_146_2","first-page":"1","volume-title":"INFOCOM","author":"Yi Shanhe","year":"2016","unstructured":"Shanhe Yi, Zhengrui Qin, Ed Novak, Yafeng Yin, and Qun Li. 2016. Glassgesture: Exploring head gesture interface of smart glasses. In INFOCOM. IEEE, USA, 1\u20139."},{"key":"e_1_3_3_3_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7804002"},{"key":"e_1_3_3_3_148_2","doi-asserted-by":"crossref","unstructured":"Yongtuo Zhang Wen Hu Weitao Xu Chun\u00a0Tung Chou and Jiankun Hu. 2018. Continuous authentication using eye movement response of implicit visual stimuli. Interactive Mobile Wearable and Ubiquitous Technologies 1 4 (2018) 1\u201322.","DOI":"10.1145\/3161410"},{"key":"e_1_3_3_3_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2018.8446129"},{"key":"e_1_3_3_3_150_2","doi-asserted-by":"publisher","unstructured":"Zhenyong Zhang Kedi Yang Youliang Tian and Jianfeng Ma. 2024. An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse. IEEE Transactions on Information Forensics and Security (2024) 1\u20131. 10.1109\/TIFS.2024.3410527","DOI":"10.1109\/TIFS.2024.3410527"},{"key":"e_1_3_3_3_151_2","doi-asserted-by":"publisher","unstructured":"Xiaoli Zhao Yu Ren and Kenny S.\u00a0L. Cheah. 2023. Leading Virtual Reality (VR) and Augmented Reality (AR) in Education: Bibliometric and Content Analysis From the Web of Science (2018\u00e2\u20ac\u201c2022). Sage Open 13 3 (2023) 21582440231190821. 10.1177\/21582440231190821","DOI":"10.1177\/21582440231190821"},{"key":"e_1_3_3_3_152_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376233"},{"key":"e_1_3_3_3_153_2","doi-asserted-by":"publisher","unstructured":"Huadi Zhu Wenqiang Jin Mingyan Xiao Srinivasan Murali and Ming Li. 2020. BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices. Interactive Mobile Wearable and Ubiquitous Technologies 4 4 (Dec. 2020) 1\u201329. 10.1145\/3432217","DOI":"10.1145\/3432217"},{"key":"e_1_3_3_3_154_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24298"},{"key":"e_1_3_3_3_155_2","doi-asserted-by":"crossref","unstructured":"Tiantian Zhu Lei Fu Qiang Liu Zi Lin Yan Chen and Tieming Chen. 2020. One cycle attack: Fool sensor-based personal gait authentication with clustering. IEEE Transactions on Information Forensics and Security 16 (2020) 553\u2013568.","DOI":"10.1109\/TIFS.2020.3016819"}],"event":{"name":"VRST '25: 31st ACM Symposium on Virtual Reality Software and Technology","location":"Montreal QC Canada","acronym":"VRST '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"]},"container-title":["Proceedings of the 2025 31st ACM Symposium on Virtual Reality Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756884.3766016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T09:13:34Z","timestamp":1764926014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756884.3766016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":154,"alternative-id":["10.1145\/3756884.3766016","10.1145\/3756884"],"URL":"https:\/\/doi.org\/10.1145\/3756884.3766016","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"2025-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}