{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:26:29Z","timestamp":1730319989001,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Samsung Electronics Samsung Research"},{"name":"MSIP (Ministry of Science ICT and Future Planning) Korea","award":["IITP-2017-2015-0-00403"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196555","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T09:18:28Z","timestamp":1527758308000},"page":"75-87","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["The Personal Identification Chord"],"prefix":"10.1145","author":[{"given":"Ian","family":"Oakley","sequence":"first","affiliation":[{"name":"UNIST, Ulsan, Rebublic of Korea"}]},{"given":"Jun Ho","family":"Huh","sequence":"additional","affiliation":[{"name":"Samsung Electronics, Seoul, Rebublic of Korea"}]},{"given":"Junsung","family":"Cho","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Rebublic of Korea"}]},{"given":"Geumhwan","family":"Cho","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Rebublic of Korea"}]},{"given":"Rasel","family":"Islam","sequence":"additional","affiliation":[{"name":"UNIST, Ulsan, Rebublic of Korea"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Rebublic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Human memory: A proposed system and its control processes. The psychology of learning and motivation 2","author":"Atkinson Richard C","year":"1968","unstructured":"Richard C Atkinson and Richard M Shiffrin . 1968. Human memory: A proposed system and its control processes. The psychology of learning and motivation 2 ( 1968 ), 89--195. Richard C Atkinson and Richard M Shiffrin. 1968. Human memory: A proposed system and its control processes. The psychology of learning and motivation 2 (1968), 89--195."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"volume-title":"Proceedings of the 16th International Conference on Financial Cryptography and Data Security. 25--40","author":"Bonneau Joseph","key":"e_1_3_2_1_5_1","unstructured":"Joseph Bonneau , S\u00f6ren Preibusch , and Ross J. Anderson . 2012. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs . In Proceedings of the 16th International Conference on Financial Cryptography and Data Security. 25--40 . Joseph Bonneau, S\u00f6ren Preibusch, and Ross J. Anderson. 2012. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In Proceedings of the 16th International Conference on Financial Cryptography and Data Security. 25--40."},{"key":"e_1_3_2_1_6_1","volume-title":"Psychophysical bases of perceived exertion. Med sci sports exerc 14, 5","author":"Borg Gunnar A","year":"1982","unstructured":"Gunnar A Borg . 1982. Psychophysical bases of perceived exertion. Med sci sports exerc 14, 5 ( 1982 ), 377--381. Gunnar A Borg. 1982. Psychophysical bases of perceived exertion. Med sci sports exerc 14, 5 (1982), 377--381."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642694"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 11st Symposium On Usable Privacy and Security (SOUPS '15)","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the Impact of Touch ID on iPhone Passcodes . In Proceedings of the 11st Symposium On Usable Privacy and Security (SOUPS '15) . 257--276. https:\/\/www. usenix.org\/conference\/soups2015\/proceedings\/presentation\/cherapau Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the Impact of Touch ID on iPhone Passcodes. In Proceedings of the 11st Symposium On Usable Privacy and Security (SOUPS '15). 257--276. https:\/\/www. usenix.org\/conference\/soups2015\/proceedings\/presentation\/cherapau"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.61"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025561"},{"volume-title":"Google Smart Unlock. https:\/\/get.google.com\/smartlock\/. (2017). {Online","year":"2017","key":"e_1_3_2_1_11_1","unstructured":"Google. 2017. Google Smart Unlock. https:\/\/get.google.com\/smartlock\/. (2017). {Online ; accessed 19- Sept- 2017 }. Google. 2017. Google Smart Unlock. https:\/\/get.google.com\/smartlock\/. (2017). {Online; accessed 19-Sept-2017}."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_15"},{"volume-title":"Effect of Button Size and Location When Pointing with Index Finger on Smartwatch","author":"Hara Kiyotaka","key":"e_1_3_2_1_13_1","unstructured":"Kiyotaka Hara , Takeshi Umezawa , and Noritaka Osawa . 2015. Effect of Button Size and Location When Pointing with Index Finger on Smartwatch . Springer International Publishing , Cham , 165--174. Kiyotaka Hara, Takeshi Umezawa, and Noritaka Osawa. 2015. Effect of Button Size and Location When Pointing with Index Finger on Smartwatch. Springer International Publishing, Cham, 165--174."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS '14). 213--230. https:\/\/www.usenix.org\/ conference\/soups2014\/proceedings\/presentation\/harbach","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel von Zezschwitz , Andreas Fichtner , Alexander De Luca , and Matthew Smith . 2014 . It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception . In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS '14). 213--230. https:\/\/www.usenix.org\/ conference\/soups2014\/proceedings\/presentation\/harbach Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS '14). 213--230. https:\/\/www.usenix.org\/ conference\/soups2014\/proceedings\/presentation\/harbach"},{"key":"e_1_3_2_1_15_1","volume-title":"Staveland","author":"Hart Sandra G.","year":"1988","unstructured":"Sandra G. Hart and Lowell E . Staveland . 1988 . Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research. In Human Mental Workload, Peter A. Hancock and Najmedin Meshkati (Eds.). Advances in Psychology, Vol. 52 . North-Holland , 139 -- 183. Sandra G. Hart and Lowell E. Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research. In Human Mental Workload, Peter A. Hancock and Najmedin Meshkati (Eds.). Advances in Psychology, Vol. 52. North-Holland, 139 -- 183."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2360743.2360824"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702518"},{"key":"e_1_3_2_1_18_1","first-page":"623","article-title":"Commercial transactions via a wearable computer with a display. (Nov. 18 2013)","volume":"13","author":"Jakobson Gabriel","year":"2013","unstructured":"Gabriel Jakobson and Steven Rueben . 2013 . Commercial transactions via a wearable computer with a display. (Nov. 18 2013) . US Patent App. 13\/998 , 623 . Gabriel Jakobson and Steven Rueben. 2013. Commercial transactions via a wearable computer with a display. (Nov. 18 2013). US Patent App. 13\/998,623.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_19_1","unstructured":"Markus Jakobsson and Ruj Akavipat. 2011. Rethinking passwords to adapt to constrained keyboards. (2011). http:\/\/www.markus-jakobsson.com\/fastwords. pdf Markus Jakobsson and Ruj Akavipat. 2011. Rethinking passwords to adapt to constrained keyboards. (2011). http:\/\/www.markus-jakobsson.com\/fastwords. pdf"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.003"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858166"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858384"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 13rd Symposium On Usable Privacy and Security (SOUPS '17)","author":"Nguyen Toan","year":"2017","unstructured":"Toan Nguyen and Nasir Memon . 2017 . Smartwatches Locking Methods: A Comparative Study . In Proceedings of the 13rd Symposium On Usable Privacy and Security (SOUPS '17) . Santa Clara, CA. https:\/\/www.usenix.org\/conference\/ soups 2017\/workshop-program\/way2017\/nguyen Toan Nguyen and Nasir Memon. 2017. Smartwatches Locking Methods: A Comparative Study. In Proceedings of the 13rd Symposium On Usable Privacy and Security (SOUPS '17). Santa Clara, CA. https:\/\/www.usenix.org\/conference\/ soups2017\/workshop-program\/way2017\/nguyen"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858179"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555261_24"},{"key":"e_1_3_2_1_30_1","volume-title":"The Galaxy S8 And Pixel Should Copy LG's Knock Code. https:\/\/www.forbes.com\/sites\/bensin\/2017\/03\/02\/ the-galaxy-s8-and-pixel-should-copy-lgs-knock-code. (2017). {Online","author":"Sin Ben","year":"2017","unstructured":"Ben Sin . 2017. The Galaxy S8 And Pixel Should Copy LG's Knock Code. https:\/\/www.forbes.com\/sites\/bensin\/2017\/03\/02\/ the-galaxy-s8-and-pixel-should-copy-lgs-knock-code. (2017). {Online ; accessed 19- Sept- 2017 }. Ben Sin. 2017. The Galaxy S8 And Pixel Should Copy LG's Knock Code. https:\/\/www.forbes.com\/sites\/bensin\/2017\/03\/02\/ the-galaxy-s8-and-pixel-should-copy-lgs-knock-code. (2017). {Online; accessed 19-Sept-2017}."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639189.2639218"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817721.2817737"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858593"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123021.3123049"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T21:35:58Z","timestamp":1673213758000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196555"}},"subtitle":["A Four ButtonAuthentication System for Smartwatches"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":35,"alternative-id":["10.1145\/3196494.3196555","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196555","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}