{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:26Z","timestamp":1767340046856,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246685"},{"type":"electronic","value":"9783642246692"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24669-2_15","type":"book-chapter","created":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T10:05:36Z","timestamp":1319277936000},"page":"153-164","source":"Crossref","is-referenced-by-count":6,"title":["A Hybrid Graphical Password Based System"],"prefix":"10.1007","author":[{"given":"Wazir Zada","family":"Khan","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Mohammed Y.","family":"Aalsalem","sequence":"additional","affiliation":[]},{"given":"Quratulain","family":"Arshad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"van Oorschot Tao Wan, P.C.: TwoStep: An Authentication Method Combining Text and Graphical Passwords. In: 4th International Conference, MCETECH 2009, Ottawa, Canada (May 4-6, 2009)","DOI":"10.1007\/978-3-642-01187-0_19"},{"key":"15_CR2","unstructured":"Authentication, http:\/\/www.objs.com\/survey\/authent.htm (last visited on May 15, 2011)"},{"key":"15_CR3","unstructured":"Sobrado, L., Birget, J.C.: Graphical Passwords, The Rutgers Schloar, An Electronic Bulletin for Undergraduate Research, vol. 4 (2002), http:\/\/rutgersscholar.rutgers.edu\/volume04\/sobrbirg\/sobrbirg.htm"},{"key":"15_CR4","unstructured":"Elftmann, P.: Diploma Thesis, Secure Alternatives to Password-Based Authentication Mechanisms, Aachen, Germany (October 2006)"},{"key":"15_CR5","unstructured":"Blonder, G.E.: Graphical password. U.S. Patent 5559961, Lucent Technologies, Inc., Murray Hill, NJ (August 1995)"},{"key":"15_CR6","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical Passwords: A Survey. In: Proceedings of Annual Computer Security Applications Conference (2005)"},{"key":"15_CR7","unstructured":"Approaches to Authentication, http:\/\/www.e.govt.nz\/plone\/archive\/services\/see\/see-pki-paper-3\/chapter6.html?q=archive\/services\/see\/see-pki-paper-3\/chapter6.html (last visited on May 15, 2011)"},{"key":"15_CR8","unstructured":"Roman, V.Y.: User authentication via behavior based passwords. In: Systems, Applications and Technology Conference, Farmingdale, NY (2007)"},{"key":"15_CR9","unstructured":"Biometric Authentication, http:\/\/www.cs.bham.ac.uk\/~mdr\/teaching\/modules\/security\/lectures\/biometric.html (last visited on May 02, 11)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: A New Graphical Password Scheme Resistant to Shoulder-Surfing. In: 2010 International Conference on CyberWorlds, Singapore (October 20-22, 2010)","DOI":"10.1109\/CW.2010.34"},{"key":"15_CR11","unstructured":"Perrig, A., Song, D.: Hash Visualization: A New Technique to improve Real-World Security. In: International Workshop on Cryptographic Techniques and E-Commerce, pp. 131\u2013138 (1999)"},{"key":"15_CR12","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On User Choice in Graphical Password Schemes. In: 13th USENIX Security Symposium (2004)"},{"key":"15_CR13","unstructured":"Leung, W.H., Chen, T.: Hierarchical Matching For Retrieval of Hand Drawn Sketches. In: Proceeding of International Conference on Multimedia and Expo (ICME 2003), vol.\u00a02 (2003)"},{"key":"15_CR14","unstructured":"Khan, H.Z.U.: Comparative Study Of Authentication Techniques. International Journal of Video & Image Processing and Network Security IJVIPNS\u00a010(04)"},{"key":"15_CR15","unstructured":"Token Based Authentication, http:\/\/www.w3.org\/2001\/sw\/Europe\/events\/foafgalway\/papers\/fp\/token_based_authentication\/ (last visited on May 02, 2011)"},{"key":"15_CR16","unstructured":"Knowledge Based Authentication, http:\/\/csrc.nist.gov\/archive\/kba\/index.html (last visited on May 02, 2011)"},{"key":"15_CR17","unstructured":"Knowledge based Authentication, http:\/\/searchsecurity.techtarget.com\/definition\/knowledge-based-authentication (last visited on May 02, 2011)"},{"key":"15_CR18","unstructured":"A Survey on Recognition based Graphical User Authentication Algorithms, http:\/\/www.scribd.com\/doc\/23730953\/A-Survey-on-Recognition-Based-Graphical-User-Authentication-Algorithms (last Visited on May 02, 2011)"},{"volume-title":"Biometrics: personal identification in networked society","year":"1999","key":"15_CR19","unstructured":"Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: personal identification in networked society. Kluwer Academic, Boston (1999)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Hurson, A.R., Ploskonka, J., Jiao, Y., Haridas, H.: Security issues and Solutions in Distributed heterogeneous Mobile Database Systems. In: Advances in Computers, vol.\u00a061, pp. 107\u2013198 (2004)","DOI":"10.1016\/S0065-2458(03)61003-X"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.C.: Graphical Passwords: Learning from the First Twelve Years, Carleton University - School of Computer Science, Technical Report TR-11-01 (January 4, 2011)","DOI":"10.1145\/2333112.2333114"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Weinshall, D.: Cognitive authentication schemes safe against spyware, (short paper). In: IEEE Symposium on Security and Privacy (May 2006)","DOI":"10.1109\/SP.2006.10"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Christin, N., Dhamija, R., Perrig, A.: Use Your Illusion: Secure authentication usable anywhere. In: 4th ACM Symposium on Usable Privacy and Security (SOUPS), Pittsburgh (July 2008)","DOI":"10.1145\/1408664.1408670"},{"key":"15_CR24","unstructured":"Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: 13th USENIX Security Symposium (2004)"},{"key":"15_CR25","unstructured":"Passfaces Corporation. The science behind Passfaces, White paper, http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm (last visited on May 05, 11)"},{"issue":"1-2","key":"15_CR26","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A. Angeli De","year":"2005","unstructured":"De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. International Journal of Human-Computer Studies\u00a063(1-2), 128\u2013152 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Moncur, W., Leplatre, G.: Pictures at the ATM: Exploring the usability of multiple graphical passwords. In: ACM Conference on Human Factors in Computing Systems (CHI) (April 2007)","DOI":"10.1145\/1240624.1240758"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. In: Pervasive Computing, pp. 30\u201336 (January-March 2003)","DOI":"10.1109\/MPRV.2003.1186723"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.: Design and evaluation of a shoulder-surfng resistant graphical password scheme. In: International Working Conference on Advanced Visual Interfaces (AVI) (May 2006)","DOI":"10.1145\/1133265.1133303"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: 33rd Annual IEEE International Computer Software and Applications Conference (2009)","DOI":"10.1109\/COMPSAC.2009.153"},{"key":"15_CR31","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: 8th USENIX Security Symposium (August 1999)"},{"key":"15_CR32","unstructured":"Valentine, T.: An Evaluation of the Passface TM Personal Authentication System, Technical Report. Goldmsiths College University of London, London (1998) (the first report known in the literature)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24669-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T08:04:59Z","timestamp":1560845099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24669-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246685","9783642246692"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24669-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}