{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:44:29Z","timestamp":1743101069087,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117515"},{"type":"electronic","value":"9783319117522"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11752-2_38","type":"book-chapter","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T06:05:43Z","timestamp":1413266743000},"page":"464-475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Human Factors Study of Graphical Passwords Using Biometrics"],"prefix":"10.1007","author":[{"given":"Benjamin S.","family":"Riggan","sequence":"first","affiliation":[]},{"given":"Wesley E.","family":"Snyder","sequence":"additional","affiliation":[]},{"given":"Xiaogang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,15]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, P.K., Avraham, H.K., Kaplan, H., Sharir, M.: Computing the discrete fre\u00e9chet distance in subquadratic time. In: Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 156\u2013167 (2013)","DOI":"10.1137\/1.9781611973105.12"},{"issue":"1\u20132","key":"38_CR2","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1142\/S0218195995000064","volume":"5","author":"H Alt","year":"1995","unstructured":"Alt, H., Godau, H.: Computing the fr\u00e9chet distance between two polygonal curves. Int. J. Comput. Geom. Appl. 5(1\u20132), 75\u201391 (1995)","journal-title":"Int. J. Comput. Geom. Appl."},{"key":"38_CR3","volume-title":"Dynamic Programming","author":"R Bellman","year":"1957","unstructured":"Bellman, R.: Dynamic Programming. Princeton University Press, Princeton (1957)"},{"issue":"4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1\u201325 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"1\u20132","key":"38_CR5","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A De Angeli","year":"2005","unstructured":"De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum. Comput. Stud. 63(1\u20132), 128\u2013152 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Do background images improve \u201cdraw a secret\u201d graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 36\u201347 (2007)","DOI":"10.1145\/1315245.1315252"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: Yet another graphical password strategy. In: Proceedings of the Annual Computer Security Applications Conference, pp. 121\u2013129 (2008)","DOI":"10.1109\/ACSAC.2008.19"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Goldberg, J., Hagman, J.: Doodling our way to better authentication. In: Proceedings of the ACM Conference on Human Factors in Computing Systems, pp. 868\u2013869 (2002)","DOI":"10.1145\/506443.506639"},{"key":"38_CR9","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium, pp. 1\u201314 (1999)"},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.patrec.2009.09.016","volume":"31","author":"K Krish","year":"2010","unstructured":"Krish, K., Heinrich, S., Snyder, W.E., Cakir, H., Khorram, S.: Global registration of overlapping images using accumulative image features. Pattern Recogn. Lett. 31, 112\u2013118 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/ACCESS.2013.2281773","volume":"1","author":"M Martinez-Diaz","year":"2013","unstructured":"Martinez-Diaz, M., Fierrez, J., Galbally, J.: The DooDB graphical password database: data analysis and benchmark results. IEEE Access 1, 596\u2013605 (2013)","journal-title":"IEEE Access"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Martinez-Diaz, M., Fierrez, J., Martin-Diaz, C., Ortega-Garcia, J.: DooDB: a graphical password database containing doodles and pseudo-signatures. In: 12th International Conference on Frontiers in Handwriting Recognition, pp. 339\u2013344 (2010)","DOI":"10.1109\/ICFHR.2010.59"},{"key":"38_CR13","unstructured":"Riggan, B.S.: Recognition of sketch-based passwords with biometric information using a generalized simple K-space model. Ph.D thesis\/Dissertation, North Carolina State University (2014)"},{"key":"38_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/11566489_93","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2005","author":"M Rousson","year":"2005","unstructured":"Rousson, M., Cremers, D.: Efficient kernel density estimation of shape and intensity priors for level set segmentation. In: Duncan, J.S., Gerig, G. (eds.) MICCAI 2005. LNCS, vol. 3750, pp. 757\u2013764. Springer, Heidelberg (2005)"},{"key":"38_CR15","unstructured":"Snyder, W.E.: A strategy for shape recognition. In: Srivastava, A. (ed.) Workshop on Challenges and Opportunities in Image Understanding, College Park, MD, January 2007"},{"issue":"2","key":"38_CR16","first-page":"273","volume":"7","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 7(2), 273\u2013292 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"38_CR17","unstructured":"Varenhorst, C.: Passdoodles: a lightweight authentication method. MIT Research Science Institute, July 2004"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11752-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T14:21:10Z","timestamp":1675347670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11752-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117515","9783319117522"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11752-2_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}