{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:31:29Z","timestamp":1743042689176,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_47","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"573-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Designing Double-Click-Based Unlocking Mechanism on Smartphones"],"prefix":"10.1007","author":[{"given":"Wenjuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiao","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"47_CR1","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1\u20137. USENIX Association (2010)"},{"key":"47_CR2","first-page":"371","volume":"2018","author":"AR Al-Sudani","year":"2018","unstructured":"Al-Sudani, A.R., Gao, S., Wen, S., Al-Khiza\u2019ay, M.: Checking an authentication of person depends on RFID with thermal image. SpaCCS 2018, 371\u2013380 (2018)","journal-title":"SpaCCS"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 538\u2013552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you!: implicit authentication based on touch screen patterns. In: Proceedings of CHI, pp. 987\u2013996. ACM (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"47_CR5","unstructured":"Deloitte\u2019s 2019 global mobile consumer survey. https:\/\/www2.deloitte.com\/content\/dam\/insights\/us\/articles\/glob43115_2019-global-mobile-survey\/DI_2019-global-mobile-survey.pdf"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451\u2013456. IEEE, USA (2012)","DOI":"10.1109\/THS.2012.6459891"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Findling, R.D., Mayrhofer, R.: Towards face unlock: on the difficulty of reliably detecting faces on mobile phones. In: MoMM, pp. 275\u2013280 (2012)","DOI":"10.1145\/2428955.2429008"},{"issue":"1","key":"47_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"47_CR9","doi-asserted-by":"publisher","first-page":"101700","DOI":"10.1016\/j.cose.2019.101700","volume":"90","author":"M Gomez-Barrero","year":"2020","unstructured":"Gomez-Barrero, M., Galbally, J.: Reversing the irreversible: a survey on inverse biometrics. Comput. Secur. 90, 101700 (2020)","journal-title":"Comput. Secur."},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Guo, Y., Yang, L., Ding, X., Han, J., Liu, Y.: OpenSesame: unlocking smart phone through handshaking biometrics. In: INFOCOM, pp. 365\u2013369 (2013)","DOI":"10.1109\/INFCOM.2013.6566796"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Izuta, R., Murao, K., Terada, T., Iso, T., Inamura, H., Tsukamoto, M.: Screen unlocking method using behavioral characteristics when taking mobile phone from pocket. In: MoMM, pp. 110\u2013114 (2016)","DOI":"10.1145\/3007120.3007162"},{"key":"47_CR12","doi-asserted-by":"publisher","first-page":"103408","DOI":"10.1016\/j.csi.2019.103408","volume":"69","author":"X Larrucea","year":"2020","unstructured":"Larrucea, X., Moffie, M., Asaf, I.S.: Santamaria: towards a GDPR compliant way to secure European cross border healthcare industry 4.0. Comput. Stand. Interfaces 69, 103408 (2020)","journal-title":"Comput. Stand. Interfaces"},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: A closer look tells more: a facial distortion based liveness detection for face authentication. In: AsiaCCS, pp. 241\u2013246 (2019)","DOI":"10.1145\/3321705.3329850"},{"key":"47_CR14","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TIFS.2020.3013212","volume":"16","author":"Y Li","year":"2021","unstructured":"Li, Y., Cheng, Y., Meng, W., Li, Y., Deng, R.H.: Designing leakage-resilient password entry on head-mounted smart wearable glass devices. IEEE Trans. Inf. Forensics Secur. 16, 307\u2013321 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"47_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-030-30619-9_11","volume-title":"Machine Learning for Cyber Security","author":"W Li","year":"2019","unstructured":"Li, W., Tan, J., Meng, W., Wang, Yu., Li, J.: SwipeVLock: a supervised unlocking mechanism based on swipe behavior on smartphones. In: Chen, X., Huang, X., Zhang, J. (eds.) ML4CS 2019. LNCS, vol. 11806, pp. 140\u2013153. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30619-9_11"},{"key":"47_CR16","doi-asserted-by":"publisher","first-page":"102687","DOI":"10.1016\/j.jnca.2020.102687","volume":"165","author":"W Li","year":"2020","unstructured":"Li, W., Tan, J., Meng, W., Wang, Y.: A swipe-based unlocking mechanism with supervised learning on smartphones: design and evaluation. J. Netw. Comput. Appl 165, 102687 (2020)","journal-title":"J. Netw. Comput. Appl"},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings of the 7th IEEE International Conference on Networking, Architecture, and Storage (NAS), pp. 39\u201348 (2012)","DOI":"10.1109\/NAS.2012.9"},{"key":"47_CR18","doi-asserted-by":"crossref","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC), IFIP Advances in Information and Communication Technology, vol. 405, pp. 55\u201368 (2013)","DOI":"10.1007\/978-3-642-39218-4_5"},{"issue":"3","key":"47_CR19","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng, W., Wong, D.S., Furnell, S., Zhou, J.: Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutorials 17(3), 1268\u20131293 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Meng, W.: RouteMap: a route and map based graphical password scheme for better multiple password memory. In: Proceedings of the 9th International Conference on Network and System Security (NSS), pp. 147\u2013161 (2015)","DOI":"10.1007\/978-3-319-25645-0_10"},{"issue":"3","key":"47_CR21","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ICS-12-2014-0078","volume":"24","author":"W Meng","year":"2016","unstructured":"Meng, W.: Evaluating the effect of multi-touch behaviours on android unlock patterns. Inf. Comput. Secur. 24(3), 277\u2013287 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Meng, W., Li, W., Wong, D.S., Zhou, J.: TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones. In: Proceedings of the 14th International Conference on Applied Cryptography and Network Security (ACNS), pp. 629\u2013647 (2016)","DOI":"10.1007\/978-3-319-39555-5_34"},{"key":"47_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-78556-1_18","volume-title":"Information Security and Cryptology \u2013 ICISC 2017","author":"W Meng","year":"2018","unstructured":"Meng, W., Lee, W.H., Liu, Z., Su, C., Li, Y.: Evaluating the impact of juice filming charging attack in practical environments. In: Kim, H., Kim, D.-C. (eds.) ICISC 2017. LNCS, vol. 10779, pp. 327\u2013338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78556-1_18"},{"key":"47_CR24","doi-asserted-by":"crossref","unstructured":"Meng, W., Fei, F., Li, W., Au, M.H.: Harvesting smartphone privacy through enhanced juice filming charging attacks. In: Proceedings of ISC, pp. 291\u2013308 (2017)","DOI":"10.1007\/978-3-319-69659-1_16"},{"key":"47_CR25","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.-F., Choo, K.-K.R.: Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65, 213\u2013229 (2017)","journal-title":"Comput. Secur."},{"key":"47_CR26","doi-asserted-by":"crossref","unstructured":"Meng, W., Li, W., Lee, W., Jiang, L., Zhou, J.: A Pilot Study of Multiple Password Interference between Text and Map-based Passwords. In: Proceedings of the 15th International Conference on Applied Cryptography and Network Security (ACNS), pp. 145\u2013162 (2017)","DOI":"10.1007\/978-3-319-61204-1_8"},{"key":"47_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-59870-3_17","volume-title":"Information Security and Privacy","author":"W Meng","year":"2017","unstructured":"Meng, W., Lee, W.H., Au, M.H., Liu, Z.: Exploring effect of location number on map-based graphical password authentication. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 301\u2013313. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59870-3_17"},{"key":"47_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.05.012","volume":"78","author":"D Nyang","year":"2018","unstructured":"Nyang, D., Kim, H., Lee, W., Kang, S., Cho, G., Lee, M.K., Mohaisen, A.: Two-thumbs-up: physical protection for PIN entry secure against recording attacks. Comput. Secur. 78, 1\u201315 (2018)","journal-title":"Comput. Secur."},{"issue":"1","key":"47_CR29","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"key":"47_CR30","doi-asserted-by":"crossref","unstructured":"Smith-Creasey, M., Rajarajan, M.: A continuous user authentication scheme for mobile devices. In: Proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST), pp. 104\u2013113 (2016)","DOI":"10.1109\/PST.2016.7906944"},{"issue":"2","key":"47_CR31","first-page":"7","volume":"26","author":"J Spitzer","year":"2010","unstructured":"Spitzer, J., Singh, C., Schweitzer, D.: A security class project in graphical passwords. J. Comput. Sci. Coll. 26(2), 7\u201313 (2010)","journal-title":"J. Comput. Sci. Coll."},{"issue":"10","key":"47_CR32","doi-asserted-by":"publisher","first-page":"2726","DOI":"10.1109\/TMC.2016.2635643","volume":"16","author":"M Shahzad","year":"2017","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans. Mob. Comput. 16(10), 2726\u20132741 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"47_CR33","doi-asserted-by":"crossref","unstructured":"Sharma, V., Enbody, R.: User authentication and identification from user interface interactions on touch-enabled devices. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pp. 1\u201311 (2017)","DOI":"10.1145\/3098243.3098262"},{"key":"47_CR34","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp. 463\u2013472. IEEE Computer Society, USA (2005)"},{"key":"47_CR35","doi-asserted-by":"crossref","unstructured":"Sun, H., Chen, Y., Fang, C., Chang, S.: PassMap: a map based graphical-password authentication system. In: Proceedings of AsiaCCS, pp. 99\u2013100 (2012)","DOI":"10.1145\/2414456.2414513"},{"issue":"7","key":"47_CR36","first-page":"273","volume":"2","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-Go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 2(7), 273\u2013292 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"47_CR37","doi-asserted-by":"crossref","unstructured":"Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of geopass: a geographic location-password scheme. In: Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201314 (2013)","DOI":"10.1145\/2501604.2501618"},{"key":"47_CR38","doi-asserted-by":"crossref","unstructured":"Wang, L., et al.: Unlock with your heart: heartbeat-based authentication on commercial mobile phones. In: Proceedings of ACM Interactive, Mobile, Wearable Ubiquitous Technologies, vol. 2, no. 3, pp. 140:1\u2013140:22 (2018)","DOI":"10.1145\/3264950"},{"key":"47_CR39","unstructured":"Weka: Machine Learning Software in Java. https:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"issue":"1\u20132","key":"47_CR40","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"47_CR41","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of CCS, pp. 162\u2013175 (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"47_CR42","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., Carter, N., Li, Q.: WearLock: unlocking your phone via acoustics using smartwatch. In: ICDCS, pp. 469\u2013479 (2017)","DOI":"10.1109\/ICDCS.2017.183"},{"key":"47_CR43","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: Proceedings of the 2014 International Conference on Network Protocols (ICNP), pp. 221\u2013232 (2014)","DOI":"10.1109\/ICNP.2014.43"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:53:05Z","timestamp":1612828385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}