{"id":"https://openalex.org/W4292158613","doi":"https://doi.org/10.1145/3538969.3539011","title":"SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays","display_name":"SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4292158613","doi":"https://doi.org/10.1145/3538969.3539011"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3539011","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3539011","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3539011","source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3539011","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058230468","display_name":"Reyhan D\u00fczg\u00fcn","orcid":"https://orcid.org/0000-0003-1244-7822"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Reyhan D\u00fczg\u00fcn","raw_affiliation_strings":["SECUSO Research Group, Karlsruhe Institute of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"SECUSO Research Group, Karlsruhe Institute of Technology, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025506002","display_name":"Naheem Noah","orcid":"https://orcid.org/0000-0001-8416-1415"},"institutions":[{"id":"https://openalex.org/I131651094","display_name":"University of Denver","ror":"https://ror.org/04w7skc03","country_code":"US","type":"education","lineage":["https://openalex.org/I131651094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naheem Noah","raw_affiliation_strings":["University of Denver, United States"],"affiliations":[{"raw_affiliation_string":"University of Denver, United States","institution_ids":["https://openalex.org/I131651094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033826310","display_name":"Peter Mayer","orcid":"https://orcid.org/0000-0002-6267-4874"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Peter Mayer","raw_affiliation_strings":["Karlsruhe Institute of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059400253","display_name":"Sanchari Das","orcid":"https://orcid.org/0000-0003-1299-7867"},"institutions":[{"id":"https://openalex.org/I131651094","display_name":"University of Denver","ror":"https://ror.org/04w7skc03","country_code":"US","type":"education","lineage":["https://openalex.org/I131651094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sanchari Das","raw_affiliation_strings":["University of Denver, United States"],"affiliations":[{"raw_affiliation_string":"University of Denver, United States","institution_ids":["https://openalex.org/I131651094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022078187","display_name":"Melanie Volkamer","orcid":"https://orcid.org/0000-0003-2674-4043"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Melanie Volkamer","raw_affiliation_strings":["Karlsruhe Institute of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5058230468"],"corresponding_institution_ids":["https://openalex.org/I102335020"],"apc_list":null,"apc_paid":null,"fwci":3.638,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.94417053,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.858493983745575},{"id":"https://openalex.org/keywords/augmented-reality","display_name":"Augmented reality","score":0.8118406534194946},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7972941398620605},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7518718242645264},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6825045347213745},{"id":"https://openalex.org/keywords/virtual-reality","display_name":"Virtual reality","score":0.47222021222114563},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4642159938812256},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.45261910557746887},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30036288499832153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27392324805259705}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.858493983745575},{"id":"https://openalex.org/C153715457","wikidata":"https://www.wikidata.org/wiki/Q254183","display_name":"Augmented reality","level":2,"score":0.8118406534194946},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7972941398620605},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7518718242645264},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6825045347213745},{"id":"https://openalex.org/C194969405","wikidata":"https://www.wikidata.org/wiki/Q170519","display_name":"Virtual reality","level":2,"score":0.47222021222114563},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4642159938812256},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.45261910557746887},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30036288499832153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27392324805259705}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3538969.3539011","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3539011","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3539011","source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3538969.3539011","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3538969.3539011","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3538969.3539011","source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.550000011920929}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311641","display_name":"University of Denver","ror":"https://ror.org/04w7skc03"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4292158613.pdf","grobid_xml":"https://content.openalex.org/works/W4292158613.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1994281102","https://openalex.org/W2030112111","https://openalex.org/W2085592842","https://openalex.org/W2112767991","https://openalex.org/W2122122381","https://openalex.org/W2399736900","https://openalex.org/W2401398128","https://openalex.org/W2402816380","https://openalex.org/W2511036412","https://openalex.org/W2615339033","https://openalex.org/W2741095865","https://openalex.org/W2756169798","https://openalex.org/W2791352940","https://openalex.org/W2795270809","https://openalex.org/W2807428430","https://openalex.org/W2896215559","https://openalex.org/W2900302157","https://openalex.org/W2943320313","https://openalex.org/W3007128253","https://openalex.org/W3008085074","https://openalex.org/W3031422669","https://openalex.org/W3046694141","https://openalex.org/W3171962142","https://openalex.org/W3197878201","https://openalex.org/W3202983771","https://openalex.org/W4297944550","https://openalex.org/W6737869215"],"related_works":["https://openalex.org/W2982321410","https://openalex.org/W2172197285","https://openalex.org/W4378228679","https://openalex.org/W2736982640","https://openalex.org/W4378228262","https://openalex.org/W3107375852","https://openalex.org/W2752321621","https://openalex.org/W2789244453","https://openalex.org/W2187233292","https://openalex.org/W3197290876"],"abstract_inverted_index":{"The":[0,24],"adoption":[1],"of":[2,33,109,114],"Augmented":[3],"Reality":[4],"(AR)":[5],"technology":[6],"has":[7],"increased":[8],"over":[9],"the":[10,31,58,61,71,78,107,112],"years.":[11],"AR":[12,79,92,110],"enhances":[13],"various":[14,104],"activities":[15],"for":[16,91,131],"consumers":[17],"and":[18,44,48,60,125],"businesses,":[19],"particularly":[20],"in":[21],"industrial":[22],"contexts.":[23],"three-dimensional":[25],"virtual":[26],"experience":[27],"is":[28],"realized":[29],"by":[30],"usage":[32],"Head-Mounted":[34],"Displays":[35],"(HMD).":[36],"These":[37,99],"devices":[38],"provide":[39],"access":[40,56],"to":[41,54,57,68,70,75],"sensitive":[42],"data":[43,63],"services.":[45],"Thus,":[46],"secure":[47],"usable":[49],"authentication":[50,89],"schemes":[51,67,90,96,100],"are":[52],"essential":[53],"control":[55],"HMD":[59],"stored":[62],"as":[64,66,121,123],"well":[65,122],"authenticate":[69],"services":[72],"one":[73],"wants":[74],"use":[76],"with":[77],"device.":[80],"We":[81,128],"conducted":[82],"a":[83],"systematic":[84],"literature":[85],"review":[86],"on":[87],"knowledge-based":[88],"HMD.":[93],"31":[94],"different":[95],"were":[97,101],"identified.":[98],"assessed":[102],"regarding":[103],"aspects":[105],"including":[106],"type":[108,113],"HMD,":[111],"secret,":[115,120],"how":[116],"users":[117],"input":[118],"their":[119],"usability":[124],"security":[126],"aspects.":[127],"discuss":[129],"gaps":[130],"future":[132],"work.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
