{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:58Z","timestamp":1725511978622},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540799658"},{"type":"electronic","value":"9783540799665"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-79966-5_2","type":"book-chapter","created":{"date-parts":[[2008,5,6]],"date-time":"2008-05-06T07:43:43Z","timestamp":1210059823000},"page":"16-35","source":"Crossref","is-referenced-by-count":10,"title":["A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"295","volume-title":"IEEE Symposium on Security and Privacy","author":"D. Weinshall","year":"2006","unstructured":"Weinshall, D.: Cognitive authentication schemes safe against spyware (short paper). In: IEEE Symposium on Security and Privacy, pp. 295\u2013300. IEEE Computer Society, Los Alamitos (2006)"},{"key":"2_CR2","first-page":"66","volume-title":"IEEE Symposium on Security and Privacy","author":"P. Golle","year":"2007","unstructured":"Golle, P., Wagner, D.: Cryptanalysis of a cognitive authentication scheme (extended abstract). In: IEEE Symposium on Security and Privacy, pp. 66\u201370. IEEE Computer Society, Los Alamitos (2007)"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R.J. Anderson","year":"1994","unstructured":"Anderson, R.J.: Why cryptosystems fail. Commun. ACM\u00a037, 32\u201340 (1994)","journal-title":"Commun. ACM"},{"key":"2_CR4","unstructured":"Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An authentication service for open network systems. In: USENIX Winter, pp. 191\u2013202 (1988)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Haller, N.M.: The S\/KEY one-time password system. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 151\u2013157 (1994)","DOI":"10.17487\/rfc1760"},{"key":"2_CR6","unstructured":"McDonald, D.L., Atkinson, R.J., Metz, C.: One time passwords in everything (OPIE): Experiences with building and using stronger authentication. In: Fifth USENIX UNIX Security Symposium, Salt Lake City, Utah(USA) (1995)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-30598-9_11","volume-title":"Security in Communication Networks","author":"A. Juels","year":"2005","unstructured":"Juels, A.: Minimalist cryptography for low-cost rfid tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 149\u2013164. Springer, Heidelberg (2005)"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentification with insecure communication. Commun. ACM\u00a024, 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-46416-6_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T. Matsumoto","year":"1991","unstructured":"Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 409\u2013421. Springer, Heidelberg (1991)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-49264-X_31","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"C.H. Wang","year":"1995","unstructured":"Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai\u2019s Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 382\u2013392. Springer, Heidelberg (1995)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Matsumoto, T.: Human-computer cryptography: An attempt. In: ACM Conference on Computer and Communications Security, pp. 68\u201375 (1996)","DOI":"10.1145\/238168.238190"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Blum, M.: A Secure Human-Computer Authentication Scheme. In: Carnagie Mellon University Technical Report. Vol. CMU-CS-00-139 (2000)","DOI":"10.21236\/ADA382135"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11761679_6","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"J. Katz","year":"2006","unstructured":"Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB\u2009+\u2009 Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 73\u201387. Springer, Heidelberg (2006)"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1073\/pnas.95.5.2703","volume":"95","author":"C.L. Grady","year":"1998","unstructured":"Grady, C.L., Mcintosh, A.R., Rajah, M.N., Craik, F.I.M.: Neural correlates of the episodic encoding of pictures and words. Proc. Natl. Acad. Sci. USA\u00a095, 2703\u20132708 (1998)","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2_CR17","unstructured":"Blonder, G.E.: Graphical passwords. Lucent Technologies Inc, Murray Hill, NJ (US), US Patent no. 5559961 (1996)"},{"key":"2_CR18","unstructured":"Perrig, A., Song, D.: Hash visualization: A new technique to improve real-world security. In: Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (1999)"},{"key":"2_CR19","unstructured":"Dhamija, R., Perring, A.: D\u00e9j\u00e0 vu: A user study using images for authentication. In: IX USENIX UNIX Security Symposium, Denver, Colorado (2000)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Jensen, W., Gavrila, S., Korolev, V., Ayers, R., Swanstrom, R.: Picture password: a visual login technique for mobile devices. In: National Institute of Standards and Technologies Interagency Report, vol.\u00a0NISTIR 7030 (2003)","DOI":"10.6028\/NIST.IR.7030"},{"key":"2_CR21","unstructured":"Jensen, W.: Authenticating users on handheld devices. In: Proceedings of Canadian Information Technology Security Symposium (2003)"},{"key":"2_CR22","unstructured":"Real User Coorp.: Pass faces (1998), http:\/\/www.realuser.com"},{"key":"2_CR23","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX security Symposium, Washington DC (1999)"},{"key":"2_CR24","unstructured":"Sobrado, L., Birget, J.C.: Graphical password. The Rutgers Scholar, an electronic Bulletin for undergraduate research\u00a04 (2002)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of Advanced Visual Interfaces AVI 2006, Venice, ACM Press, New York, NY (2006)","DOI":"10.1145\/1133265.1133303"},{"key":"2_CR26","first-page":"236","volume-title":"CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security","author":"V. Roth","year":"2004","unstructured":"Roth, V., Richter, K., Freidinger, R.: A pin-entry method resilient against shoulder surfing. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 236\u2013245. ACM Press, New York (2004)"},{"key":"2_CR27","unstructured":"University of British Columbia (Ubcsat, the stochastic local search sat solver), http:\/\/www.satlib.org\/ubcsat"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Symposium On Usable Privacy and Security (SOUPS) (2007)","DOI":"10.1145\/1280680.1280683"},{"key":"2_CR29","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of 21st Annual Computer Security Application Conference (ACSAC 2005), December 5-9, 2005, Tucson AZ (US), pp. 463\u2013472 (2005)"},{"key":"2_CR30","unstructured":"Graphical Password Project: Fa1ces (1998), http:\/\/www.realuser.com"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79966-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T03:30:06Z","timestamp":1557545406000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79966-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540799658","9783540799665"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79966-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}