
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
VRCAuth: Continuous Authentication of Users in Virtual Reality Environment Using Head-Movement
Manimaran Sivasamy, V. N. Sastry, N. P. Gopalan
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2020), pp. 518-523
Closed Access | Times Cited: 22
Manimaran Sivasamy, V. N. Sastry, N. P. Gopalan
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2020), pp. 518-523
Closed Access | Times Cited: 22
Showing 22 citing articles:
Understanding User Identification in Virtual Reality Through Behavioral Biometrics and the Effect of Body Normalization
Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, et al.
(2021)
Closed Access | Times Cited: 62
Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, et al.
(2021)
Closed Access | Times Cited: 62
Noise-Robust Biometric Authentication Using Infrared Periocular Images Captured from a Head-Mounted Display
Junho Baek, Yeongje Park, Chae Lin Seok, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 240-240
Open Access
Junho Baek, Yeongje Park, Chae Lin Seok, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 240-240
Open Access
CoordAuth: Hands-Free Two-Factor Authentication in Virtual Reality Leveraging Head-Eye Coordination
Sheng Zhao, Jun Zhu, Shuning Zhang, et al.
(2025), pp. 738-748
Closed Access
Sheng Zhao, Jun Zhu, Shuning Zhang, et al.
(2025), pp. 738-748
Closed Access
User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review
Ioanna Anastasaki, George Drosatos, George Pavlidis, et al.
Information (2023) Vol. 14, Iss. 10, pp. 538-538
Open Access | Times Cited: 9
Ioanna Anastasaki, George Drosatos, George Pavlidis, et al.
Information (2023) Vol. 14, Iss. 10, pp. 538-538
Open Access | Times Cited: 9
Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual Reality
Jonathan Liebers, Patrick Laskowski, Florian Rademaker, et al.
(2024), pp. 1-19
Open Access | Times Cited: 3
Jonathan Liebers, Patrick Laskowski, Florian Rademaker, et al.
(2024), pp. 1-19
Open Access | Times Cited: 3
A Literature Review on Virtual Reality Authentication
John M. Jones, Reyhan Duezguen, Peter Mayer, et al.
IFIP advances in information and communication technology (2021), pp. 189-198
Closed Access | Times Cited: 22
John M. Jones, Reyhan Duezguen, Peter Mayer, et al.
IFIP advances in information and communication technology (2021), pp. 189-198
Closed Access | Times Cited: 22
Identifying Users by Their Hand Tracking Data in Augmented and Virtual Reality
Jonathan Liebers, Sascha Brockel, Uwe Gruenefeld, et al.
International Journal of Human-Computer Interaction (2022) Vol. 40, Iss. 2, pp. 409-424
Closed Access | Times Cited: 15
Jonathan Liebers, Sascha Brockel, Uwe Gruenefeld, et al.
International Journal of Human-Computer Interaction (2022) Vol. 40, Iss. 2, pp. 409-424
Closed Access | Times Cited: 15
Recent Trends of Authentication Methods in Extended Reality: A Survey
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2
Louisa Hallal, Jason Rhinelander, Ramesh Venkat
Applied System Innovation (2024) Vol. 7, Iss. 3, pp. 45-45
Open Access | Times Cited: 2
Security and privacy in virtual reality: a literature survey
Alberto Giaretta
Virtual Reality (2024) Vol. 29, Iss. 1
Open Access | Times Cited: 2
Alberto Giaretta
Virtual Reality (2024) Vol. 29, Iss. 1
Open Access | Times Cited: 2
Biometric as Secure Authentication for Virtual Reality Environment: A Systematic Literature Review
Chandra Hermawan Heruatmadja, Meyliana Meyliana, Achmad Nizar Hidayanto, et al.
2022 International Conference for Advancement in Technology (ICONAT) (2023), pp. 1-7
Closed Access | Times Cited: 5
Chandra Hermawan Heruatmadja, Meyliana Meyliana, Achmad Nizar Hidayanto, et al.
2022 International Conference for Advancement in Technology (ICONAT) (2023), pp. 1-7
Closed Access | Times Cited: 5
Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance
Ruxin Wang, Long Huang, Chen Wang
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 3450-3465
Closed Access | Times Cited: 4
Ruxin Wang, Long Huang, Chen Wang
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 3450-3465
Closed Access | Times Cited: 4
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures
H. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, et al.
Lecture notes in computer science (2024), pp. 412-431
Closed Access | Times Cited: 1
H. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, et al.
Lecture notes in computer science (2024), pp. 412-431
Closed Access | Times Cited: 1
What You Experience is What We Collect: User Experience Based Fine-Grained Permissions for Everyday Augmented Reality
Melvin Abraham, Mark McGill, Mohamed Khamis
(2024), pp. 1-24
Open Access | Times Cited: 1
Melvin Abraham, Mark McGill, Mohamed Khamis
(2024), pp. 1-24
Open Access | Times Cited: 1
Cross-content User Authentication in Virtual Reality
Wenda Shao, S D Luo, Zhisheng Yan
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2024), pp. 2098-2105
Open Access
Wenda Shao, S D Luo, Zhisheng Yan
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2024), pp. 2098-2105
Open Access
Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion
Muhammad Khurram Khan, Reem Alrawili, Ali Abdullah S. AlQahtani
(2024)
Closed Access
Muhammad Khurram Khan, Reem Alrawili, Ali Abdullah S. AlQahtani
(2024)
Closed Access
Effect of Duration and Delay on the Identifiability of VR Motion
Mark Roman Miller, Vivek Nair, Eugy Han, et al.
(2024), pp. 70-75
Open Access
Mark Roman Miller, Vivek Nair, Eugy Han, et al.
(2024), pp. 70-75
Open Access
Exploring Redirection and Shifting Techniques to Mask Hand Movements from Shoulder-Surfing Attacks during PIN Authentication in Virtual Reality
Yannick Weiß, Steeven Villa, Jesse W. Grootjen, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. MHCI, pp. 1-24
Closed Access
Yannick Weiß, Steeven Villa, Jesse W. Grootjen, et al.
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. MHCI, pp. 1-24
Closed Access
Biometrics in extended reality: a review
Ayush Agarwal, Raghavendra Ramachandra, Sushma Venkatesh, et al.
Discover Artificial Intelligence (2024) Vol. 4, Iss. 1
Open Access
Ayush Agarwal, Raghavendra Ramachandra, Sushma Venkatesh, et al.
Discover Artificial Intelligence (2024) Vol. 4, Iss. 1
Open Access
User Authentication and Identification on Smart Glasses with Motion Sensors
Sumeyye Agac, Özlem Durmaz İncel
SN Computer Science (2023) Vol. 4, Iss. 6
Closed Access | Times Cited: 1
Sumeyye Agac, Özlem Durmaz İncel
SN Computer Science (2023) Vol. 4, Iss. 6
Closed Access | Times Cited: 1
A Literature Review on Virtual Reality Authentication
John M. Jones, Reyhan Duezguen, Peter Mayer, et al.
SSRN Electronic Journal (2021)
Open Access | Times Cited: 1
John M. Jones, Reyhan Duezguen, Peter Mayer, et al.
SSRN Electronic Journal (2021)
Open Access | Times Cited: 1
Continuous Authentication
Max Smith-Creasey
SpringerBriefs in computer science (2023), pp. 35-72
Closed Access
Max Smith-Creasey
SpringerBriefs in computer science (2023), pp. 35-72
Closed Access
Modeling of Optimal Bidirectional LSTM Based Human Motion Recognition for Virtual Reality Environment
R. Thenmozhi, Shabnam Mohamed Aslam, A. Arokiaraj Jovith, et al.
Studies in systems, decision and control (2022), pp. 161-174
Closed Access
R. Thenmozhi, Shabnam Mohamed Aslam, A. Arokiaraj Jovith, et al.
Studies in systems, decision and control (2022), pp. 161-174
Closed Access