{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:39:19Z","timestamp":1725557959079},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_33","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T11:34:46Z","timestamp":1276342486000},"page":"379-388","source":"Crossref","is-referenced-by-count":1,"title":["Existing Recognition Base Usability Features of the Graphical Password"],"prefix":"10.1007","author":[{"given":"Ali Mohamed","family":"Eljetlawi","sequence":"first","affiliation":[]},{"given":"Norafida","family":"Ithnin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Sobrado, L., Birget, J.: Graphical Passwords, Rutgers University, Camden New Jersey. The Rutgers Scholar, An Electronic Bulletin of Undergraduate Research, vol.\u00a04 (2002) (Accessed on June 2007)"},{"key":"33_CR2","unstructured":"Gilhooly, K.: Biometrics: Getting Back to Business. Computerworld (May 2005)"},{"key":"33_CR3","unstructured":"Dhamija, R., Perrig, A.: D\u00e9j\u00e0 vu: A User Study Using Images for Authentication. In: Proceedings of the 9th USENIX Security Symposium (August 2000)"},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"R.N. Shepard","year":"1967","unstructured":"Shepard, R.N.: Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior\u00a06, 156\u2013163 (1967)","journal-title":"Journal of Verbal Learning and Verbal Behavior"},{"key":"33_CR5","unstructured":"Real User Corporation, PassfacesTM, http:\/\/www.realuser.com (Accessed on June 2007)"},{"key":"33_CR6","unstructured":"ISO-International Organization for Standardization, http:\/\/www.iso.org (Accessed on May 2007)"},{"key":"33_CR7","unstructured":"Mohamed, A.H.N.: Graphical password: Security and Usability Issues. In: UTM seminar (July 3-4, 2007)"},{"key":"33_CR8","unstructured":"Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: Proceedings of 9th USENIX Security Symposium (2000)"},{"key":"33_CR9","unstructured":"Man, S., Hong, D., Mathews, M.: A shoulder-surfing resistant graphical Password scheme. In: Proceedings of International conference on security and management, Las Vegas, NV (2003)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Jansen, W., Gavrila, S., Korolev, V., Ayers, R., Swanstrom, R.: Picture Password: A Visual Login Technique for Mobile Devices. NIST Report NISTIR 7030 (2003)","DOI":"10.6028\/NIST.IR.7030"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-540-45233-1_26","volume-title":"Human-Computer Interaction with Mobile Devices and Services","author":"T. Takada","year":"2003","unstructured":"Takada, T., Koike, H.: Awase-E: Image-based Authentication for Mobile Phones using User\u2019s Favorite Images. In: Chittaro, L. (ed.) Mobile HCI 2003. LNCS, vol.\u00a02795, pp. 347\u2013351. Springer, Heidelberg (2003)"},{"key":"33_CR12","volume-title":"People and Computers XIV \u2013 Usability or Else: Proceedings of HCI","author":"S. Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords: A Field Trial Investigation. In: People and Computers XIV \u2013 Usability or Else: Proceedings of HCI. Springer, Sunderland (2000)"},{"key":"33_CR13","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On User Choice in Graphical Password Schemes. In: Proceedings of the 13th USENIX Security Symposium, San Diego, California (2004)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication Using Graphical Passwords: Basic Results. In: Human-Computer Interaction International (HCII 2005), Las Vegas, NV (2005)","DOI":"10.1145\/1073001.1073002"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:48:39Z","timestamp":1606186119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}