{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:51:35Z","timestamp":1725871895782},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_4","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"66-86","source":"Crossref","is-referenced-by-count":2,"title":["SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing"],"prefix":"10.1007","author":[{"given":"Ankit","family":"Maheshwari","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-41320-9_2","volume-title":"Financial Cryptography and Data Security","author":"M Arianezhad","year":"2013","unstructured":"Arianezhad, M., Stebila, D., Mozaffari, B.: Usability and security of gaze-based graphical grid passwords. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 17\u201333. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-41320-9_2"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bai, X., Wenjun, G., Chellappan, S., Wang, X., Xuan, D., Ma, B.: PAS: predicate-based authentication services against powerful passive adversaries. In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8\u201312 December, pp. 433\u2013442 (2008)","DOI":"10.1109\/ACSAC.2008.23"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Oakley, I., Kostakos, V., Kwon, D.-S.: The phone lock: audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices. In: Proceedings of the 5th International Conference on Tangible and Embedded Interaction 2011, Funchal, Madeira, Portugal, 22\u201326 January 2011, pp. 197\u2013200 (2011)","DOI":"10.1145\/1935701.1935740"},{"issue":"4","key":"4_CR4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 19 (2012)","journal-title":"ACM Comput. Surv."},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-642-15497-3_18","volume-title":"Computer Security \u2013 ESORICS 2010","author":"H Bojinov","year":"2010","unstructured":"Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286\u2013302. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15497-3_18"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Chakraborty, N., Mondal, S.: Color Pass: an intelligent user interface to resist shoulder surfing attack. In: Proceedings of the IEEE Students\u2019 Technology Symposium (TechSym), Kharagpur, India, 28 February\u20132 March 2014, pp. 13\u201318 (2014)","DOI":"10.1109\/TechSym.2014.6807906"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-319-13841-1_17","volume-title":"Information Systems Security","author":"N Chakraborty","year":"2014","unstructured":"Chakraborty, N., Mondal, S.: An improved methodology towards providing immunity against weak shoulder surfing attack. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 298\u2013317. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-13841-1_17"},{"key":"4_CR8","unstructured":"Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing users towards better passwords: persuasive cued click-points. In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, BCS HCI 2008, Liverpool, United Kingdom, 1\u20135 September 2008, vol. 1, pp. 121\u2013130 (2008)"},{"key":"4_CR9","unstructured":"Gaylord, C.: Linkedin, last. fm, now yahoo? don\u2019t ignore news of a password breach. Christian Science Monitor (2012)"},{"key":"4_CR10","unstructured":"Gross, D.: 50 million compromised in evernote hack. CNN (2013)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4\u20138 November 2013, pp. 145\u2013160 (2013)","DOI":"10.1145\/2508859.2516671"},{"key":"4_CR12","unstructured":"Komanduri, S., Hutchings, D.R.: Order and entropy in picture passwords. In: Proceedings of the Graphics Interface 2008 Conference, 28\u201330 May 2008, Windsor, Ontario, Canada, pp. 115\u2013122 (2008)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, 18\u201320 July 2007, pp. 13\u201319 (2007)","DOI":"10.1145\/1280680.1280683"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"De Luca, A., Weiss, R., Drewes, H.: Evaluation of eye-gaze interaction methods for security enhanced pin-entry. In: Proceedings of the 2007 Australasian Computer-Human Interaction Conference, OZCHI 2007, Adelaide, Australia, 28\u201330 November 2007, pp. 199\u2013202 (2007)","DOI":"10.1145\/1324892.1324932"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Ma, J., Yang, W., Luo, M., Li, N.: A study of probabilistic password models. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, 18\u201321 May 2014, pp. 689\u2013704 (2014)","DOI":"10.1109\/SP.2014.50"},{"issue":"2","key":"4_CR16","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"G Miller","year":"1956","unstructured":"Miller, G.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81\u201397 (1956)","journal-title":"Psychol. Rev."},{"key":"4_CR17","unstructured":"Perkovi\u0107, T., \u010cagalj, M., Raki\u0107, N.: SSSL: Shoulder surfing safe login. In: 17th International Conference on Software, Telecommunications & Computer Networks, SoftCOM 2009, pp. 270\u2013275. IEEE (2009)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Roth, V., Richter, K., Freidinger, R.: A pin-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, 25\u201329 October 2004, pp. 236\u2013245 (2004)","DOI":"10.1145\/1030083.1030116"},{"key":"4_CR19","unstructured":"Stn, A., Kaseva, A., Virtanen, T.: Fooling fingerprint scanners-biometric vulnerabilities of the precise biometrics 100 sc scanner. In: Proceedings of the 4th Australian Information Warfare and IT Security Conference, pp. 333\u2013340 (2003)"},{"issue":"6984","key":"4_CR20","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1038\/nature02447","volume":"428","author":"EK Vogel","year":"2004","unstructured":"Vogel, E.K., Machizawr, M.G.: Neural activity predicts individual differences in visual working memory capacity. Nature 428(6984), 748\u2013751 (2004)","journal-title":"Nature"},{"key":"4_CR21","unstructured":"Wang, D., Wang, P.: Measuring human-chosen pins: Characteristics, distribution and security (2013). http:\/\/wangdingg.weebly.com\/uploads\/2\/0\/3\/6\/20366987\/pin_zipf.pdf\/"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., de Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 30th IEEE Symposium on Security and Privacy (S&P 2009), 17\u201320 May 2009, Oakland, California, USA, pp. 391\u2013405 (2009)","DOI":"10.1109\/SP.2009.8"},{"issue":"5","key":"4_CR23","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"JJ Yan","year":"2004","unstructured":"Yan, J.J., Blackwell, A.F., Anderson, R.J., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, X.: S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme. In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, vol. 2, 21\u201323 May 2007, Niagara Falls, Canada, pp. 467\u2013472 (2007)","DOI":"10.1109\/AINAW.2007.317"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:18:17Z","timestamp":1498349897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}