{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:24:39Z","timestamp":1750501479472},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_17","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"301-313","source":"Crossref","is-referenced-by-count":15,"title":["Exploring Effect of Location Number on Map-Based Graphical Password Authentication"],"prefix":"10.1007","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Wang Hao","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 538\u2013552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-540-74835-9_24","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S Chiasson","year":"2007","unstructured":"Chiasson, S., Oorschot, P.C., Biddle, R.: Graphical password authentication using cued click points. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 359\u2013374. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-74835-9_24"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Biddle, R., van Oorschot, P.C.: A second look at the usability of click-based graphical passwords. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201312. ACM, New York (2007)","DOI":"10.1145\/1280680.1280682"},{"issue":"2","key":"17_CR4","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S Chiasson","year":"2012","unstructured":"Chiasson, S., Stobert, E., Forget, A., Biddle, R.: Persuasive cued click-points: design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable Secur. Comput. 9(2), 222\u2013235 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"17_CR5","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: Proceedings of the 13th Conference on USENIX Security Symposium (SSYM), pp. 151\u2013164. USENIX Association, Berkeley (2004)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.C.: Modeling user choice in the passpoints graphical password scheme. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp. 20\u201328. ACM, New York (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Do background images improve \u201cdraw a secret\u201d graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 36\u201347 (2007)","DOI":"10.1145\/1315245.1315252"},{"key":"17_CR8","unstructured":"Fox, S.: Future Online Password Could be a Map (2010). \nhttp:\/\/www.livescience.com\/8622-future-online-password-map.html"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Georgakakis, E., Komninos, N., Douligeris, C.: NAVI: novel authentication with visual information. In: Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 588\u2013595 (2012)","DOI":"10.1109\/ISCC.2012.6249360"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-74835-9_23","volume-title":"Computer Security \u2013 ESORICS 2007","author":"K Go\u0142ofit","year":"2007","unstructured":"Go\u0142ofit, K.: Click passwords under investigation. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 343\u2013358. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-74835-9_23"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Inglesant, P.G., Sasse, M.A.: The true cost of unusable password policies: password use in the wild. In: Proceedings of ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 383\u2013392 (2010)","DOI":"10.1145\/1753326.1753384"},{"key":"17_CR12","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th Conference on USENIX Security Symposium, pp. 1\u201314. USENIX Association, Berkeley (1999)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Lin, D., Dunphy, P., Olivier, P., Yan, J.: Graphical passwords & qualitative spatial relations. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp. 161\u2013162 (2007)","DOI":"10.1145\/1280680.1280708"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings of the 7th IEEE International Conference on Networking, Architecture, and Storage (NAS), pp. 39\u201348 (2012)","DOI":"10.1109\/NAS.2012.9"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34129-8_32","volume-title":"Information and Communications Security","author":"Y Meng","year":"2012","unstructured":"Meng, Y., Li, W.: Evaluating the effect of tolerance on click-draw based graphical password scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 349\u2013356. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-34129-8_32"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Meng, Y., Li, W.: Evaluating the effect of user guidelines on creating click-draw based graphical passwords. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS), pp. 322\u2013327 (2012)","DOI":"10.1145\/2401603.2401673"},{"key":"17_CR17","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-39218-4_5","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 55\u201368. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-39218-4_5"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-25645-0_10","volume-title":"Network and System Security","author":"W Meng","year":"2015","unstructured":"Meng, W.: RouteMap: a route and map based graphical password scheme for better multiple password memory. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) NSS 2015. LNCS, vol. 9408, pp. 147\u2013161. Springer, Cham (2015). doi:\n10.1007\/978-3-319-25645-0_10"},{"issue":"3","key":"17_CR19","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/ICS-12-2014-0078","volume":"24","author":"W Meng","year":"2016","unstructured":"Meng, W.: Evaluating the effect of multi-touch behaviours on Android unlock patterns. Inf. Comput. Secur. 24(3), 277\u2013287 (2016). Emerald","journal-title":"Inf. Comput. Secur."},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-319-39555-5_34","volume-title":"Applied Cryptography and Network Security","author":"W Meng","year":"2016","unstructured":"Meng, W., Li, W., Wong, D.S., Zhou, J.: TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 629\u2013647. Springer, Cham (2016). doi:\n10.1007\/978-3-319-39555-5_34"},{"key":"17_CR21","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.-F., Choo, K.-K.R.: Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65, 213\u2013229 (2017)","journal-title":"Comput. Secur."},{"issue":"5","key":"17_CR22","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1037\/0278-7393.2.5.523","volume":"2","author":"DL Nelson","year":"1976","unstructured":"Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp. Psychol. Hum. Learn. Mem. 2(5), 523\u2013528 (1976)","journal-title":"J. Exp. Psychol. Hum. Learn. Mem."},{"key":"17_CR23","unstructured":"Passfaces. \nhttp:\/\/www.realuser.com\/"},{"issue":"1","key":"17_CR24","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"issue":"2","key":"17_CR25","first-page":"7","volume":"26","author":"J Spitzer","year":"2010","unstructured":"Spitzer, J., Singh, C., Schweitzer, D.: A security class project in graphical passwords. J. Comput. Sci. Coll. 26(2), 7\u201313 (2010)","journal-title":"J. Comput. Sci. Coll."},{"key":"17_CR26","doi-asserted-by":"crossref","first-page":"3927","DOI":"10.1002\/sec.1311","volume":"8","author":"J Shin","year":"2015","unstructured":"Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: a smarter geolocation-based authentication scheme. Secur. Commun. Netw. 8, 3927\u20133938 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"17_CR27","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp. 463\u2013472. IEEE Computer Society, USA (2005)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Sun, H., Chen, Y., Fang, C., Chang, S.: PassMap: a map based graphical-password authentication system. In: Proceedings of ASIACCS, pp. 99\u2013100 (2012)","DOI":"10.1145\/2414456.2414513"},{"issue":"7","key":"17_CR29","first-page":"273","volume":"2","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-Go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 2(7), 273\u2013292 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of GeoPass: a geographic location-password scheme. In: Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201314 (2013)","DOI":"10.1145\/2501604.2501618"},{"issue":"1\u20132","key":"17_CR31","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of CCS, pp. 162\u2013175 (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"17_CR33","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2, 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:20:30Z","timestamp":1496096430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}