{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:49:43Z","timestamp":1726040983565},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030290283"},{"type":"electronic","value":"9783030290290"}],"license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29029-0_55","type":"book-chapter","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T04:04:51Z","timestamp":1565755491000},"page":"560-569","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule"],"prefix":"10.1007","author":[{"given":"Makoto","family":"Nagatomo","sequence":"first","affiliation":[]},{"given":"Kazuki","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Kentaro","family":"Aburada","sequence":"additional","affiliation":[]},{"given":"Naonobu","family":"Okazaki","sequence":"additional","affiliation":[]},{"given":"Mirang","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"55_CR1","unstructured":"Smartwatch Market Expected to Grow 41% in 2018. \n                    https:\/\/www.futuresource-consulting.com\/press-release\/consumer-electronics-press\/smartwatch-market-expected-to-grow-41-in-2018\/\n                    \n                  . Accessed 17 June 2019"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/11555261_24","volume-title":"Human-Computer Interaction - INTERACT 2005","author":"Katie A. Siek","year":"2005","unstructured":"Siek, K.A., Rogers, Y., Connelly, K.H.: Fat finger worries: how older and younger users physically interact with PDAs. In: Proceedings of the 2005 IFIP TC13 International Conference on Human-Computer Interaction, pp. 267\u2013280 (2005)"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Khan, H., Hengartner, U., Vogel, D.: Evaluating attack and defense strategies for smartphone PIN shouder surfing. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, no. 164, 10 pages (2018)","DOI":"10.1145\/3173574.3173738"},{"issue":"7","key":"55_CR4","first-page":"835","volume":"119","author":"K Divyapriya","year":"2018","unstructured":"Divyapriya, K., Prabhu, P.: Image based authentication using illusion pin for shoulder surfing attack. Int. J. Pure Appl. Math. 119(7), 835\u2013840 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"issue":"1","key":"55_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1587\/transinf.2017MUP0012","volume":"E101","author":"S Higashikawa","year":"2018","unstructured":"Higashikawa, S., Kosugi, T., Kitajima, S., Mambo, M.: Shoulder-surfing resistant authentication using pass pattern of pattern lock. IEICE Trans. Inf. Syst. E101(1), 45\u201352 (2018)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"9","key":"55_CR6","first-page":"1513","volume":"58","author":"M Tanaka","year":"2017","unstructured":"Tanaka, M., Hiroyuki, I.: Proposal of improved background pattern slide authentication against shoulder surfing in consideration of convenience. J. Inf. Process. Soc. Jpn. 58(9), 1513\u20131522 (2017). (in Japanese)","journal-title":"J. Inf. Process. Soc. Jpn."},{"key":"55_CR7","unstructured":"Kita, Y., Okazaki, N., Nishimura, H.: Implementation and evaluation of shoulder-surfing attack resistant users. IEICE Trans. Inf. Syst. J97-D(12), 1770\u20131784 (2014). (in Japanese)"},{"key":"55_CR8","unstructured":"The Galaxy S8 and Pixel Should Copy LG\u2019s Knock Code. \n                    https:\/\/www.forbes.com\/sites\/bensin\/2017\/03\/02\/the-galaxy-s8-and-pixel-should-copy-lgs-knock-code\/\n                    \n                  . Accessed 17 June 2019"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Oakley, I., Huh, J.H., Cho, J., Cho, G., Islam, R., Kim, H.: The personal identification chord: a four button authentication system for smartwatches. In: ASIACSS 2018 (2018)","DOI":"10.1145\/3196494.3196555"},{"key":"55_CR10","unstructured":"SmartWatch 3. \n                    https:\/\/www.sony.jp\/sp-acc\/special\/swr50style\/\n                    \n                  . Accessed 13 May 2019"},{"issue":"3","key":"55_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0166-4115(08)62386-9","volume":"1","author":"SG Hart","year":"1988","unstructured":"Hart, S.G., Staveland, L.E.: Development of NASA-TLX (task load index): result of empirical and theoretical research. Hum. Ment. Work. 1(3), 139\u2013183 (1988)","journal-title":"Hum. Ment. Work."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Networked-based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29029-0_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T04:21:24Z","timestamp":1565756484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29029-0_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"ISBN":["9783030290283","9783030290290"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29029-0_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"assertion":[{"value":"15 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS - 2019","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oita","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}