{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:08Z","timestamp":1742913368138,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_10","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"107-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Investigating the Use of Gesture-Based Passwords by the Seniors"],"prefix":"10.1007","author":[{"given":"Lakshmidevi","family":"Sreeramareddy","sequence":"first","affiliation":[]},{"given":"Pewu","family":"Mulbah","sequence":"additional","affiliation":[]},{"given":"Jinjuan Heidi","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/01449290600802031","volume":"27","author":"TA Hart","year":"2008","unstructured":"Hart, T.A., Chaparro, B.S., Halcomb, C.G.: Evaluating websites for older adults: adherence to \u2018senior-friendly\u2019 guidelines and end-user performance. Behav. Inf. Technol. 27, 191\u2013199 (2008)","journal-title":"Behav. Inf. Technol."},{"issue":"4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1\u201341 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10_CR3","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1080\/01449290601173770","volume":"26","author":"K Renaud","year":"2007","unstructured":"Renaud, K., Ramsay, J.: Now what was that password again? a more flexible way of identifying and authenticating our seniors. Behav. Inf. Technol. 26(4), 309\u2013322 (2007)","journal-title":"Behav. Inf. Technol."},{"key":"10_CR4","unstructured":"Sreeramareddy, L., Feng, J., Sears, A.: Poster: preliminary investigation of gesture-based password: integrating additional user behavioral features. In: Symposium on Usable Privacy and Security (SOUPS), pp. 4\u20135 (2012)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Sreeramareddy, L., Janprasert, A., Heidifeng, J.: Evaluating gesture-based password and impact of input devices. In: The International Conference on Security and Management (2014)","DOI":"10.1145\/2663761.2664207"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: YAGP: yet another graphical password strategy. In: 2008 Annual Computer Security. Applications Conference, pp. 121\u2013129 (2008)","DOI":"10.1109\/ACSAC.2008.19"},{"issue":"12","key":"10_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Abdullah, M.D.H., Abdullah, A.H., Ithnin, N., Mammi, H.K.: Towards identifying usability and security features of graphical password in knowledge based authentication technique. In: 2008 Second Asia International Conference Modeling and Simulation, pp. 396\u2013403 (2008)","DOI":"10.1109\/AMS.2008.136"},{"key":"10_CR9","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of 8th USENIX Security Symposium, pp. 1\u20134 (1999)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Weiss, R., De Luca, A.: PassShapes - Utilizing Stroke Based Authentication to Increase Password Memorability, pp. 18\u201322 (2008)","DOI":"10.1145\/1463160.1463202"},{"key":"10_CR11","unstructured":"Owen, G.S.: Graphical passwords: a survey. In: 21st Annu. Computer Security Applications Conference, (ACSAC), pp. 463\u2013472 (2005)"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-1-4471-0515-2_27","volume-title":"People and Computers XIV \u2014 Usability or Else!: Proceedings of HCI 2000","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV \u2014 Usability or Else!: Proceedings of HCI 2000, pp. 405\u2013424. Springer, Heidelberg (2000)"},{"issue":"2","key":"10_CR13","first-page":"145","volume":"6","author":"AH Lashkari","year":"2009","unstructured":"Lashkari, A.H., Farmand, S., Zakaria, O.B., Saleh, R.: Shoulder surfing attack in graphical password authentication. Int. J. Comput. Sci. Inf. Secur. IJCSIS 6(2), 145\u2013154 (2009)","journal-title":"Int. J. Comput. Sci. Inf. Secur. IJCSIS"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Zakaria, N.H., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of Seventh Symposium Usable Privacy and Security - SOUPS 2011, p. 1 (2011)","DOI":"10.1145\/2078827.2078835"},{"key":"10_CR15","unstructured":"Nali, D., Thorpe, J.: Analyzing user choice in graphical passwords. School of Computer Science, Carleton University Technical report TR-04-01, pp. 1\u20136 (2004)"},{"key":"10_CR16","unstructured":"Varenhorst, C.: Passdoodles: a lightweight authentication method. MIT Res. Sci. Inst. (2004)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"DeLuca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019 s you! implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 987\u2013996 (2012)","DOI":"10.1145\/2207676.2208544"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 977\u2013986 (2012)","DOI":"10.1145\/2207676.2208543"},{"issue":"4","key":"10_CR19","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10209-006-0060-x","volume":"5","author":"SJ Czaja","year":"2007","unstructured":"Czaja, S.J., Lee, C.C.: The impact of aging on access to technology. Univers. Access Inf. Soc. 5(4), 341\u2013349 (2007)","journal-title":"Univers. Access Inf. Soc."},{"key":"10_CR20","unstructured":"Age Related Cognitive Decline. Life Extension Foundation for Long lIfe. \n                      http:\/\/www.lef.org\/Protocols\/Neurological\/Age-Related-Cognitive-Decline\/Page-01"},{"key":"10_CR21","unstructured":"CareMonitor, L.: Online Password Security Tips for Seniors, Senior Tech Daily. \n                      http:\/\/seniortechdaily.com\/online-password-security-tips-for-seniors\/"},{"key":"10_CR22","unstructured":"Anthony, L., Wobbrock, J.O.: A lightweight multistroke recognizer for user interface prototypes. In: Human- Computer Interaction Institute, Carnegie Mellon University (2012)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:16:02Z","timestamp":1583507762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}