{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:35Z","timestamp":1763468195196,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_11","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"115-126","source":"Crossref","is-referenced-by-count":43,"title":["Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method"],"prefix":"10.1007","author":[{"given":"Panagiotis","family":"Andriotis","sequence":"first","affiliation":[]},{"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[]},{"given":"George","family":"Oikonomou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 1\u20136. ACM (2013)","DOI":"10.1145\/2462096.2462098"},{"key":"11_CR2","unstructured":"Askoxylakis, I.G., Kastanis, D.D., Traganitis, A.: Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks. In: Communication, Network, and Information Security, pp. 50\u201360 (2006)"},{"key":"11_CR3","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: 4th USENIX Conference on Offensive Technologies, pp. 1\u20137. USENIX Association (2010)"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R. Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: Learning from the first twelve years. ACM Computing Surveys\u00a044(4), 1\u201341 (2012)","journal-title":"ACM Computing Surveys"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium Security and Privacy (SP), pp. 538\u2013552. IEEE (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, A.: Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In: People and Computers XIV Usability or Else!. Springer, London (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"11_CR7","unstructured":"Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: USENIX Assosiation Proceedings of the 13th USENIX Security Symposium, pp. 151\u2013163. USENIX Association (2004)"},{"key":"11_CR8","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: 8th USENIX Security Symposium, pp. 1\u201314 (1999)"},{"key":"11_CR9","unstructured":"Passfaces Corporation.: The Science Behind Passfaces. White paper, \n                    \n                      http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm"},{"key":"11_CR10","unstructured":"Solar Designer. John the Ripper, \n                    \n                      http:\/\/www.openwall.com\/john\/"},{"issue":"4","key":"11_CR11","doi-asserted-by":"crossref","first-page":"669","DOI":"10.3233\/JCS-2010-0411","volume":"19","author":"P.C. Oorschot van","year":"2011","unstructured":"van Oorschot, P.C., Thorpe, J.: Exploiting Predictability in Click-based Graphical Passwords. Journal of Computer Security\u00a019(4), 669\u2013702 (2011)","journal-title":"Journal of Computer Security"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"van Oorschot, P.C., Thorpe, J.: On predictive models and user-drawn graphical passwords. ACM Trans. Inf. Syst. Secur.\u00a010(4), 5:1\u20135:33 (2008)","DOI":"10.1145\/1284680.1284685"},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M.A. Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the \u2018weakest link\u2019 - a human\/computer interaction approach to usable and effective security. BT Technology Journal\u00a019(3), 122\u2013131 (2001)","journal-title":"BT Technology Journal"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3758\/BF03337426","volume":"19","author":"L. Standing","year":"1970","unstructured":"Standing, L., Conezio, J., Haber, R.N.: Perception and Memory for Pictures: Single-trial Learning of 2500 Visual Stimuli. Psychonomic Science\u00a019(2), 73\u201374 (1970)","journal-title":"Psychonomic Science"},{"issue":"2","key":"11_CR15","first-page":"273","volume":"7","author":"H. Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. International Journal of Network Security\u00a07(2), 273\u2013292 (2008)","journal-title":"International Journal of Network Security"},{"key":"11_CR16","unstructured":"Thorpe, J., van Oorschot, P.C.: Human-seeded attacks and exploiting hot-spots in graphical passwords. In: USENIX Assosiation Proceedings of the 16th USENIX Security Symposium, pp. 103\u2013118. USENIX Association (2007)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Uellenbeck, S., D\u00fcrmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 161\u2013172. ACM (2013)","DOI":"10.1145\/2508859.2516700"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:13:54Z","timestamp":1582413234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}