{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T05:46:58Z","timestamp":1745300818212,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319957289"},{"type":"electronic","value":"9783319957296"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95729-6_12","type":"book-chapter","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T13:19:16Z","timestamp":1531142356000},"page":"182-197","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Novel Hybrid Password Authentication Scheme Based on Text and Image"],"prefix":"10.1007","author":[{"given":"Ian","family":"Mackie","sequence":"first","affiliation":[]},{"given":"Merve","family":"Y\u0131ld\u0131r\u0131m","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"issue":"12","key":"12_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999). https:\/\/doi.org\/10.1145\/322796.322806","journal-title":"Commun. ACM"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1037\/0033-2909.109.2.204","volume":"109","author":"A Brown","year":"1991","unstructured":"Brown, A.: A review of the tip-of-the-tongue experience. Psychol. Bull. 109(2), 204\u2013223 (1991)","journal-title":"Psychol. Bull."},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/S0022-5371(66)80040-3","volume":"5","author":"R Brown","year":"1966","unstructured":"Brown, R., McNeill, D.: The tip of the tongue phenomenon. J. Verbal Learn. Verbal Behav. 5(4), 325\u2013337 (1966)","journal-title":"J. Verbal Learn. Verbal Behav."},{"volume-title":"Perfect Passwords","year":"2006","key":"12_CR4","unstructured":"Burnett, M., Kleiman, D. (eds.): Perfect Passwords. Syngress Publishing Inc., Rockland (2006)"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Chen, Y.L., Ku, W.C., Yeh, Y.C., Liao, D.M.: A simple text-based shoulder surfing resistant graphical password scheme. In: IEEE 2nd International Symposium on Next-Generation Electronics. pp. 161\u2013164. IEEE, February 2013. https:\/\/doi.org\/10.1109\/ISNE.2013.6512317","DOI":"10.1109\/ISNE.2013.6512317"},{"key":"12_CR6","unstructured":"Collider, S.: How secure is my password? (2016). https:\/\/howsecureismypassword.net. Accessed 14 Jan 2017"},{"key":"12_CR7","volume-title":"Dictionary of Linguistics and Phonetics","author":"D Crystal","year":"2011","unstructured":"Crystal, D.: Dictionary of Linguistics and Phonetics, vol. 30. Wiley, New York (2011)"},{"key":"12_CR8","unstructured":"Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: Proceedings of The 13th USENIX Security Symposium, pp. 151\u2013164. USENIX Association, San Diego (2004)"},{"key":"12_CR9","unstructured":"Encyclopedia.com: Tip-of-the-tongue phenomenon - dictionary definition of tip-of-the-tongue phenomenon. http:\/\/www.encyclopedia.com\/psychology\/encyclopedias-almanacstranscripts-and-maps\/tip-tongue-phenomenon. Accessed 9 Nov 2016"},{"issue":"2","key":"12_CR10","first-page":"320","volume":"8","author":"M Haque","year":"2014","unstructured":"Haque, M., Imam, B.: A new graphical password: combination of recall & recognition based approach. Int. J. Comput. Electric. Autom. Control Inf. Eng. 8(2), 320\u2013324 (2014)","journal-title":"Int. J. Comput. Electric. Autom. Control Inf. Eng."},{"issue":"2","key":"12_CR11","first-page":"579","volume":"3","author":"M Haque","year":"2012","unstructured":"Haque, M., Imam, B., Ahmad, N.: 2-round hybrid password scheme. Int. J. Comput. Eng. Technol. (IJCET) 3(2), 579\u2013587 (2012)","journal-title":"Int. J. Comput. Eng. Technol. (IJCET)"},{"issue":"4","key":"12_CR12","first-page":"747","volume":"3","author":"P Mokal","year":"2014","unstructured":"Mokal, P., Devikar, R.: A survey on shoulder surfing resistant text based graphical password schemes. Int. J. Sci. Res. (IJSR) 3(4), 747\u2013750 (2014)","journal-title":"Int. J. Sci. Res. (IJSR)"},{"key":"12_CR13","unstructured":"Passwordmeter.com. (n.d.): Password strength checker (2017). http:\/\/www.passwordmeter.com. Accessed 5 Jan 2017"},{"issue":"3","key":"12_CR14","first-page":"163","volume":"1","author":"K Rao","year":"2012","unstructured":"Rao, K., Yalamanchili, A.: Novel shoulder-surfing resistant authentication schemes using text-graphical passwords. Int. J. Inf. Netw. Secur. 1(3), 163\u2013170 (2012)","journal-title":"Int. J. Inf. Netw. Secur."},{"issue":"5","key":"12_CR15","doi-asserted-by":"publisher","first-page":"737","DOI":"10.3758\/s13421-010-0066-8","volume":"39","author":"B Schwartz","year":"2011","unstructured":"Schwartz, B., Metcalfe, J.: Tip-of-the-tongue (TOT) states: retrieval, behaviour, and experience. Memory Cognit. 39(5), 737\u2013749 (2011)","journal-title":"Memory Cognit."},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"R Shepard","year":"1967","unstructured":"Shepard, R.: Recognition memory for words, sentences and pictures. J. Verbal Learn. Verbal Behav. 6, 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"issue":"3","key":"12_CR17","first-page":"111","volume":"3","author":"M Sreelatha","year":"2011","unstructured":"Sreelatha, M., Shashi, M., Anirudh, M., Ahamer, M., Manoj Kumar, V.: Authentication schemes for session passwords using color and images. Int. J. Netw. Secur. Appl. 3(3), 111\u2013119 (2011)","journal-title":"Int. J. Netw. Secur. Appl."},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"669","DOI":"10.3233\/JCS-2010-0411","volume":"19","author":"P Van Oorschot","year":"2011","unstructured":"Van Oorschot, P., Thorpe, J.: Exploiting predictability in click-based graphical passwords. J. Comput. Secur. 19(4), 669\u2013702 (2011)","journal-title":"J. Comput. Secur."},{"key":"12_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-01187-0_19","volume-title":"E-Technologies: Innovation in an Open World","author":"PC van Oorschot","year":"2009","unstructured":"van Oorschot, P.C., Wan, T.: TwoStep: an authentication method combining text and graphical passwords. In: Babin, G., Kropf, P., Weiss, M. (eds.) MCETECH 2009. LNBIP, vol. 26, pp. 233\u2013239. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01187-0_19"},{"key":"12_CR20","unstructured":"Vorster, J., van Heerden, R.: A study of perceptions of graphical passwords (2015). https:\/\/www.researchgate.net\/publication\/283712970_A_Study_of_Perceptions_of_Graphical_Passwords. Accessed 2 June 2016"},{"issue":"5","key":"12_CR21","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Priv. Secur. 2(5), 25\u201331 (2004)","journal-title":"IEEE Priv. Secur."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Monrose, F., Reiter, M.K.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 176\u2013186 (2010)","DOI":"10.1145\/1866307.1866328"},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Zhao, H., Li, X.: S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007, vol. 2, pp. 467\u2013472, May 2007. https:\/\/doi.org\/10.1109\/AINAW.2007.317","DOI":"10.1109\/AINAW.2007.317"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95729-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:04:52Z","timestamp":1657325092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95729-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319957289","9783319957296"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95729-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergamo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec18.unibg.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}