{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:27:23Z","timestamp":1750505243062,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319998275"},{"type":"electronic","value":"9783319998282"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99828-2_2","type":"book-chapter","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T11:35:10Z","timestamp":1535196910000},"page":"18-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CPMap: Design of Click-Points Map-Based Graphical Password Authentication"],"prefix":"10.1007","author":[{"given":"Weizhi","family":"Meng","sequence":"first","affiliation":[]},{"given":"Fei","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Lijun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]},{"given":"Jinguang","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,26]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 538\u2013552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"2_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-540-74835-9_24","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S Chiasson","year":"2007","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: Graphical password authentication using cued click points. In: Biskup, J., Lopez, J. (eds.) Computer Security \u2013 ESORICS 2007. ESORICS 2007, vol. 4734, pp. 359\u2013374. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74835-9_24"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Biddle, R., van Oorschot, P.C.: A second look at the usability of click-based graphical passwords. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201312. ACM, New York (2007)","DOI":"10.1145\/1280680.1280682"},{"issue":"2","key":"2_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S Chiasson","year":"2012","unstructured":"Chiasson, S., Stobert, E., Forget, A., Biddle, R.: Persuasive cued click-points: design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans Dependable Secure Comput. 9(2), 222\u2013235 (2012)","journal-title":"IEEE Trans Dependable Secure Comput."},{"key":"2_CR5","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: Proceedings of the 13th Conference on USENIX Security Symposium (SSYM), pp. 151\u2013164. USENIX Association, Berkeley (2004)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.C.: Modeling user choice in the PassPoints graphical password scheme. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp. 20\u201328. ACM, New York (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Do background images improve \u201cdraw a secret\u201d graphical passwords? In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 36\u201347 (2007)","DOI":"10.1145\/1315245.1315252"},{"key":"2_CR8","unstructured":"Fox, S.: Future Online Password Could be a Map. http:\/\/www.livescience.com\/8622-future-online-password-map.html (2010)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Georgakakis, E., Komninos, N., Douligeris, C.: NAVI: novel authentication with visual information. In: Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 588\u2013595 (2012)","DOI":"10.1109\/ISCC.2012.6249360"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-74835-9_23","volume-title":"Computer Security \u2013 ESORICS 2007","author":"K Go\u0142ofit","year":"2007","unstructured":"Go\u0142ofit, K.: Click passwords under investigation. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 343\u2013358. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74835-9_23"},{"key":"2_CR11","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th Conference on USENIX Security Symposium, pp. 1\u201314. USENIX Association, Berkeley (1999)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Lin, D., Dunphy, P., Olivier, P., Yan, J.: Graphical passwords & qualitative spatial relations. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), pp. 161\u2013162 (2007)","DOI":"10.1145\/1280680.1280708"},{"issue":"9","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1109\/TIFS.2016.2570681","volume":"11","author":"B MacRae","year":"2016","unstructured":"MacRae, B., Salehi-Abari, A., Thorpe, J.: An exploration of geographic authentication schemes. IEEE Trans. Inf. Forensics Secur. 11(9), 1997\u20132012 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Meng, Y.: Designing click-draw based graphical password scheme for better authentication. In: Proceedings of the 7th IEEE International Conference on Networking, Architecture, and Storage (NAS), pp. 39\u201348 (2012)","DOI":"10.1109\/NAS.2012.9"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34129-8_32","volume-title":"Information and Communications Security","author":"Y Meng","year":"2012","unstructured":"Meng, Y., Li, W.: Evaluating the effect of tolerance on click-draw based graphical password scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 349\u2013356. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34129-8_32"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Meng, Y., Li, W.: Evaluating the effect of user guidelines on creating click-draw based graphical passwords. In: Proceedings of the 2012 ACM Research in Applied Computation Symposium (RACS), pp. 322\u2013327 (2012)","DOI":"10.1145\/2401603.2401673"},{"key":"2_CR17","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-39218-4_5","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Li, W., Kwok, L.-F.: Enhancing click-draw based graphical passwords using multi-touch on mobile phones. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 55\u201368. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_5"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-25645-0_10","volume-title":"Network and System Security","author":"W Meng","year":"2015","unstructured":"Meng, W.: RouteMap: a route and map based graphical password scheme for better multiple password memory. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) Network and System Security. LNCS, vol. 9408, pp. 147\u2013161. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25645-0_10"},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ICS-12-2014-0078","volume":"24","author":"W Meng","year":"2016","unstructured":"Meng, W.: Evaluating the effect of multi-touch behaviours on android unlock patterns. Inf. Comput. Secur. 24(3), 277\u2013287 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-319-39555-5_34","volume-title":"Applied Cryptography and Network Security","author":"W Meng","year":"2016","unstructured":"Meng, W., Li, W., Wong, D.S., Zhou, J.: TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 629\u2013647. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_34"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2016.11.010","volume":"65","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Kwok, L.-F., Choo, K.-K.R.: Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65, 213\u2013229 (2017)","journal-title":"Comput. Secur."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-61204-1_8","volume-title":"Applied Cryptography and Network Security","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Lee, W.H., Jiang, L., Zhou, J.: A pilot study of multiple password interference between text and map-based passwords. In: Gollmann, D., Miyaji, A., Kikuchi, H. (eds.) ACNS 2017. LNCS, vol. 10355, pp. 145\u2013162. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_8"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-59870-3_17","volume-title":"Information Security and Privacy","author":"W Meng","year":"2017","unstructured":"Meng, W., Lee, W.H., Au, M.H., Liu, Z.: Exploring effect of location number on map-based graphical password authentication. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 301\u2013313. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59870-3_17"},{"issue":"5","key":"2_CR24","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1037\/0278-7393.2.5.523","volume":"2","author":"DL Nelson","year":"1976","unstructured":"Nelson, D.L., Reed, V.S., Walling, J.R.: Pictorial superiority effect. J. Exp. Psychol. Hum. Learn. Mem. 2(5), 523\u2013528 (1976)","journal-title":"J. Exp. Psychol. Hum. Learn. Mem."},{"key":"2_CR25","unstructured":"Passfaces. http:\/\/www.realuser.com\/"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"RN Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. J. Verbal Learn. Verbal Behav. 6(1), 156\u2013163 (1967)","journal-title":"J. Verbal Learn. Verbal Behav."},{"issue":"2","key":"2_CR27","first-page":"7","volume":"26","author":"J Spitzer","year":"2010","unstructured":"Spitzer, J., Singh, C., Schweitzer, D.: A security class project in graphical passwords. J. Comput. Sci. Coll. 26(2), 7\u201313 (2010)","journal-title":"J. Comput. Sci. Coll."},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"3927","DOI":"10.1002\/sec.1311","volume":"8","author":"J Shin","year":"2015","unstructured":"Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: a smarter geolocation-based authentication scheme. Secur. Commun. Netw. 8, 3927\u20133938 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"2_CR29","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp. 463\u2013472. IEEE Computer Society (2005)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Sun, H., Chen, Y., Fang, C., Chang, S.: PassMap: a map based graphical-password authentication system. In: Proceedings of AsiaCCS, pp. 99\u2013100 (2012)","DOI":"10.1145\/2414456.2414513"},{"issue":"7","key":"2_CR31","first-page":"273","volume":"2","author":"H Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-Go: a proposal to improve the usability of graphical passwords. Int. J. Netw. Secur. 2(7), 273\u2013292 (2008)","journal-title":"Int. J. Netw. Secur."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Thorpe, J., MacRae, B., Salehi-Abari, A.: usability and security evaluation of geopass: a geographic location-password scheme. In: Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS), pp. 1\u201314 (2013)","DOI":"10.1145\/2501604.2501618"},{"issue":"1\u20132","key":"2_CR33","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of CCS, pp. 162\u2013175 (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2, 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR36","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.cose.2017.05.006","volume":"70","author":"X Yu","year":"2017","unstructured":"Yu, X., Wang, Z., Li, Y., Li, L., Zhu, W.T., Song, L.: EvoPass: evolvable graphical password against shoulder-surfing attacks. Comput. Secur. 70, 179\u2013198 (2017)","journal-title":"Comput. Secur."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99828-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:02:44Z","timestamp":1661472164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99828-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319998275","9783319998282"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99828-2_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec2018.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"330% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}