{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T09:54:56Z","timestamp":1722938096126},"publisher-location":"New York, New York, USA","reference-count":2,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"vor","delay-in-days":249,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2800835.2800905","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"365-368","source":"Crossref","is-referenced-by-count":0,"title":["Chameleon dial"],"prefix":"10.1145","author":[{"given":"Tetsuji","family":"Takada","sequence":"first","affiliation":[]},{"given":"Masaya","family":"Ishizuka","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2800835.2800905-1","doi-asserted-by":"crossref","unstructured":"H. Sasamoto, N. Christin, and E. Hayashi: Undercover: authentication usable in front of prying eyes, SIGCHI Conference on Human Factors in Computing Systems (CHI '08), pp.183--192, (2008).","DOI":"10.1145\/1357054.1357085"},{"key":"key-10.1145\/2800835.2800905-2","doi-asserted-by":"crossref","unstructured":"A. Bianchi, I. Oakley, and D. S. Kwon: Open Sesame: Design Guidelines for Invisible Passwords, IEEE Computer, Vol.45, Issue 4, pp.58--65, (2012).","DOI":"10.1109\/MC.2012.109"}],"event":{"number":"2015","sponsor":["Google Inc.","Telef\u00f3nica","SIGCHI, ACM Special Interest Group on Computer-Human Interaction","SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","FX Palo Alto Laboratory, Inc.","ISTC-PC, Intel Science and Technology Center for Pervasive Computing","Panasonic, Panasonic Corporation","Microsoft","Rakuten Institute of Technology"],"acronym":"UbiComp '15","name":"the 2015 ACM International Joint Conference","start":{"date-parts":[[2015,9,7]]},"location":"Osaka, Japan","end":{"date-parts":[[2015,9,11]]}},"container-title":["Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers - UbiComp '15"],"original-title":[],"link":[{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2800905&ftid=1628824&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:52:47Z","timestamp":1498251167000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2800835.2800905"}},"subtitle":["repeated camera-recording attack resilient PIN input scheme"],"proceedings-subject":"Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":2,"URL":"https:\/\/doi.org\/10.1145\/2800835.2800905","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}