{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:20Z","timestamp":1725575240293},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_3","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"24-30","source":"Crossref","is-referenced-by-count":3,"title":["Cryptanalysis of the Convex Hull Click Human Identification Protocol"],"prefix":"10.1007","author":[{"given":"Hassan Jameel","family":"Asghar","sequence":"first","affiliation":[]},{"given":"Shujun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Josef","family":"Pieprzyk","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Sobrado, L., Birget, J.C.: Graphical Passwords. The Rutgers Scholar\u00a04 (2002)"},{"key":"3_CR2","first-page":"467","volume-title":"AINAW 2007","author":"H. Zhao","year":"2007","unstructured":"Zhao, H., Li, X.: S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical. In: AINAW 2007, pp. 467\u2013472. IEEE Computer Society, Los Alamitos (2007)"},{"key":"3_CR3","first-page":"177","volume-title":"AVI 2006","author":"S. Wiedenbeck","year":"2006","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme. In: AVI 2006, pp. 177\u2013184. ACM, New York (2006)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-46416-6_35","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T. Matsumoto","year":"1991","unstructured":"Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 409\u2013421. Springer, Heidelberg (1991)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-49264-X_31","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"C.H. Wang","year":"1995","unstructured":"Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai\u2019s Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 382\u2013392. Springer, Heidelberg (1995)"},{"key":"3_CR6","first-page":"68","volume-title":"CCS 1996","author":"T. Matsumoto","year":"1996","unstructured":"Matsumoto, T.: Human-Computer Cryptography: An Attempt. In: CCS 1996, pp. 68\u201375. ACM, New York (1996)"},{"key":"3_CR7","unstructured":"Li, S., Shum, H.Y.: Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey. Technical report (2003)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"3_CR9","first-page":"295","volume-title":"SP 2006","author":"D. Weinshall","year":"2006","unstructured":"Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: SP 2006, pp. 295\u2013300. IEEE Computer Society, Los Alamitos (2006)"},{"key":"3_CR10","first-page":"433","volume-title":"ACSAC 2008","author":"X. Bai","year":"2008","unstructured":"Bai, X., Gu, W., Chellappan, S., Wang, X., Xuan, D., Ma, B.: PAS: Predicate-based Authentication Services against Powerful Passive Adversaries. In: ACSAC 2008, pp. 433\u2013442. IEEE Computer Society, Los Alamitos (2008)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"4367","DOI":"10.1016\/j.comcom.2008.05.005","volume":"31","author":"M. Lei","year":"2008","unstructured":"Lei, M., Xiao, Y., Vrbsky, S.V., Li, C.C.: Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. Computer Communications\u00a031, 4367\u20134375 (2008)","journal-title":"Computer Communications"},{"key":"3_CR12","first-page":"66","volume-title":"SP 2007","author":"P. Golle","year":"2007","unstructured":"Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). In: SP 2007, pp. 66\u201370. IEEE Computer Society, Los Alamitos (2007)"},{"key":"3_CR13","first-page":"209","volume-title":"ACSAC 2009","author":"S. Li","year":"2009","unstructured":"Li, S., Asghar, H.J., Pieprzyk, J., Sadeghi, A.R., Schmitz, R., Wang, H.: On the Security of PAS (Predicate-based Authentication Service). In: ACSAC 2009, pp. 209\u2013218. IEEE Computer Society, Los Alamitos (2009)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Li, S., Khayam, S.A., Sadeghi, A.R., Schmitz, R.: Breaking Randomized Linear Generation Functions based Virtual Password System. To appear in ICC 2010 (2010)","DOI":"10.1109\/ICC.2010.5502416"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1023\/A:1009894418895","volume":"3","author":"X.Y. Li","year":"1999","unstructured":"Li, X.Y., Teng, S.H.: Practical Human-Machine Identification over Insecure Channels. Journal of Combinatorial Optimization\u00a03, 347\u2013361 (1999)","journal-title":"Journal of Combinatorial Optimization"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11967668_5","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"H. Jameel","year":"2006","unstructured":"Jameel, H., Shaikh, R., Lee, H., Lee, S.: Human Identification Through Image Evaluation Using Secret Predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 67\u201384. Springer, Heidelberg (2006)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-00306-6_16","volume-title":"Information Security Applications","author":"H. Jameel","year":"2009","unstructured":"Jameel, H., Shaikh, R.A., Hung, L.X., Wei Wei, Y., Raazi, S.M.K., Canh, N.T., Lee, S., Lee, H., Son, Y., Fernandes, M.: Image-Feature Based Human Identification Protocols on Limited Display Devices. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol.\u00a05379, pp. 211\u2013224. Springer, Heidelberg (2009)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-13708-2_21","volume-title":"Applied Cryptography and Network Security","author":"H.J. Asghar","year":"2010","unstructured":"Asghar, H.J., Pieprzyk, J., Wang, H.: A New Human Identification Protocol and Coppersmith\u2019s Baby-Step Giant-Step Algorithm. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 349\u2013366. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T22:11:18Z","timestamp":1559945478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}