{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:55:19Z","timestamp":1725879319089},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525020"},{"type":"electronic","value":"9783319525037"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52503-7_3","type":"book-chapter","created":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T07:13:32Z","timestamp":1485155612000},"page":"27-38","source":"Crossref","is-referenced-by-count":0,"title":["SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack"],"prefix":"10.1007","author":[{"given":"Suryakanta","family":"Panda","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,24]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Ameer, D., Al-Absi, A.A., Mohammed, A.O., Habbal, A.M.M., Hassan, S.: Anywhere on-keyboard password technique. In: 2010 IEEE Student Conference on Research and Development (SCOReD), pp. 159\u2013163. IEEE (2010)","DOI":"10.1109\/SCORED.2010.5703993"},{"issue":"2","key":"3_CR2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10207-012-0161-x","volume":"12","author":"HJ Asghar","year":"2013","unstructured":"Asghar, H.J., Li, S., Pieprzyk, J., Wang, H.: Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Secur. 12(2), 83\u201396 (2013)","journal-title":"Int. J. Inf. Secur."},{"key":"3_CR3","unstructured":"Blonder, G.E.: Graphical password, uS Patent 5,559,961, 24., September 1996"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. In: People and Computers XIV Usability or Else!, pp. 405\u2013424. Springer (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"3_CR5","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: USENIX Security Symposium, vol. 13, p. 11 (2004)"},{"key":"3_CR6","unstructured":"Dhamija, R., Perrig, A.: Deja vu-a user study: using images for authentication. In: USENIX Security Symposium, vol. 9, p. 4 (2000)"},{"issue":"7","key":"3_CR7","first-page":"1678","volume":"8","author":"H Gao","year":"2013","unstructured":"Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. J. Softw. 8(7), 1678\u20131698 (2013)","journal-title":"J. Softw."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: A new graphical password scheme resistant to shoulder-surfing. In: 2010 International Conference on Cyberworlds (CW), pp. 194\u2013199. IEEE (2010)","DOI":"10.1109\/CW.2010.34"},{"key":"3_CR9","unstructured":"Jermyn, I., Mayer, A.J., Monrose, F., Reiter, M.K., Rubin, A.D., et al.: The design and analysis of graphical passwords. In: Usenix Security (1999)"},{"issue":"1","key":"3_CR10","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"key":"3_CR11","unstructured":"Suo, X.: A design and analysis of graphical password (2006)"},{"key":"3_CR12","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: 21st Annual Computer Security Applications Conference (ACSAC\u201905), pp. 463\u2013472. IEEE (2005)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Weiss, R., De Luca, A.: Passshapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges, pp. 383\u2013392. ACM (2008)","DOI":"10.1145\/1463160.1463202"},{"issue":"1","key":"3_CR14","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum Comput Stud. 63(1), 102\u2013127 (2005)","journal-title":"Int. J. Hum Comput Stud."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the working conference on Advanced visual interfaces, pp. 177\u2013184. ACM (2006)","DOI":"10.1145\/1133265.1133303"},{"issue":"5","key":"3_CR16","doi-asserted-by":"crossref","first-page":"765","DOI":"10.4304\/jcp.5.5.765-772","volume":"5","author":"Z Zheng","year":"2010","unstructured":"Zheng, Z., Liu, X., Yin, L., Liu, Z.: A hybrid password authentication scheme based on shape and text. J. Comput. 5(5), 765\u2013772 (2010)","journal-title":"J. Comput."}],"container-title":["Lecture Notes in Computer Science","Intelligent Human Computer Interaction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52503-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:51:28Z","timestamp":1498366288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52503-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525020","9783319525037"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52503-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}