{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:23:57Z","timestamp":1725585837202},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_7","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"80-91","source":"Crossref","is-referenced-by-count":7,"title":["Quantifying the Effect of Graphical Password Guidelines for Better Security"],"prefix":"10.1007","author":[{"given":"Mohd","family":"Jali","sequence":"first","affiliation":[]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Dowland","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A. Angeli De","year":"2005","unstructured":"De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems. International Journal of Human Computer Studies\u00a063(2), 128\u2013152 (2005)","journal-title":"International Journal of Human Computer Studies"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-540-74835-9_24","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S. Chiasson","year":"2007","unstructured":"Chiasson, S., Oorschot, P.C.V., Biddle, R.: Graphical password authentication using cued click points. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 359\u2013374. Springer, Heidelberg (2007)"},{"key":"7_CR3","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1145\/1233341.1233448","volume-title":"ACM Southeast Regional Conference","author":"C. Hinds","year":"2007","unstructured":"Hinds, C., Ekwueme, C.: Increasing security and usability of computer systems with graphical password. In: ACM Southeast Regional Conference, Winston-Salem, North Carolina, USA, pp. 529\u2013530. ACM, New York (2007)"},{"issue":"6","key":"7_CR4","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10207-009-0080-7","volume":"8","author":"S. Chiasson","year":"2009","unstructured":"Chiasson, S., Forget, A., Biddle, R., Oorschot, P.C.V.: User interface design affects security: Patterns in click-based graphical passwords. International Journal of Information Security\u00a08(6), 387\u2013398 (2009)","journal-title":"International Journal of Information Security"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S. Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. International Journal of Human Computer Studies\u00a063, 102\u2013127 (2005)","journal-title":"International Journal of Human Computer Studies"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2010.2053706","volume":"5","author":"P.C.V. Oorschot","year":"2010","unstructured":"Oorschot, P.C.V., Salehi-Abari, A., Thorpe, J.: Purely automated attacks on Passpoints-style graphical passwords. Transactions on Information Forensics and Security\u00a05(3), 393\u2013405 (2010)","journal-title":"Transactions on Information Forensics and Security"},{"key":"7_CR7","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium, California, USA, August 9-13, pp. 1\u201311. USENIX Association (2004)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1145\/1056808.1057036","volume-title":"CHI 2005 Extended Abstracts on Human Factors in Computing Systems","author":"T.S. Tullis","year":"2005","unstructured":"Tullis, T.S., Tedesco, D.P.: Using personal photos as pictorial passwords. In: CHI 2005 Extended Abstracts on Human Factors in Computing Systems, Portland, Oregon, USA, pp. 1841\u20131844. ACM, New York (2005)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1145\/1518701.1518837","volume-title":"Proceedings of the 27th International Conference on Human Factors in Computing Systems","author":"K.M. Everitt","year":"2009","unstructured":"Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, Boston, MA, USA, pp. 889\u2013898. ACM, New York (2009)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.-C.: Modelling user choice in the Passpoints graphical password scheme. Paper presented at the Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, July 18-20 (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-74835-9_23","volume-title":"Computer Security \u2013 ESORICS 2007","author":"K. Go\u0142ofit","year":"2007","unstructured":"Go\u0142ofit, K.: Click passwords under investigation. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 343\u2013358. Springer, Heidelberg (2007)"},{"key":"7_CR12","first-page":"179","volume":"2","author":"K. Golofit","year":"2007","unstructured":"Golofit, K.: Picture passwords superiority and picture passwords dictionary attacks. Journal of Information Assurance and Security\u00a02, 179\u2013183 (2007)","journal-title":"Journal of Information Assurance and Security"},{"key":"7_CR13","unstructured":"Peach, S., Voster, J., Heerden, R.V.: Heuristic Attacks against graphical password generators. In: Clarke, N., Furnell, S., Solms, R.V. (eds.) Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, pp. 272\u2013284. University of Plymouth (2010)"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/CISP.2008.603","volume-title":"Proceedings of the 2008 Congress on Image and Signal Processing","author":"P.L. Lin","year":"2008","unstructured":"Lin, P.L., Weng, L.T., Huang, P.W.: Graphical password using images with random tracks of geometric shapes. In: Proceedings of the 2008 Congress on Image and Signal Processing, pp. 27\u201331. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/11613022_28","volume-title":"Biologically Inspired Approaches to Advanced Information Technology","author":"A. Harada","year":"2006","unstructured":"Harada, A., Isarida, T., Mizuno, T., Nishigaki, M.: A User Authentication System Using Schema of Visual Memory. In: Ijspeert, A.J., Masuzawa, T., Kusumoto, S. (eds.) BioADIT 2006. LNCS, vol.\u00a03853, pp. 338\u2013345. Springer, Heidelberg (2006)"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1408664.1408670","volume-title":"Proceedings of the 4th Symposium on Usable Privacy and Security","author":"E. Hayashi","year":"2008","unstructured":"Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 4th Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 35\u201345. ACM, New York (2008)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Biddle, R., Oorschot, P.C.V.: Influencing users towards better passwords: persuasive cued click-points. In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, Liverpool, United Kingdom, vol.\u00a01, pp. 121\u2013130. British Computer Society (2008)","DOI":"10.14236\/ewic\/HCI2008.12"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1108\/09685221011035250","volume":"18","author":"M.Z. Jali","year":"2010","unstructured":"Jali, M.Z., Furnell, S.M., Dowland, P.S.: Assessing image-based authentication techniques in a web-based environment. Information Management & Computer Security\u00a018(1), 43\u201353 (2010)","journal-title":"Information Management & Computer Security"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1280680.1280682","volume-title":"Proceedings of the 3rd Symposium on Usable Privacy and Security","author":"S. Chiasson","year":"2007","unstructured":"Chiasson, S., Biddle, R., Oorschot, P.C.V.: A second look at the usability of click-based graphical passwords. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 1\u201312. ACM, New York (2007)"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T07:00:53Z","timestamp":1637823653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_7","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}