{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T04:13:00Z","timestamp":1742875980275,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_13","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T04:10:23Z","timestamp":1333339823000},"page":"182-198","source":"Crossref","is-referenced-by-count":0,"title":["High-Entropy Visual Identification for Touch Screen Devices"],"prefix":"10.1007","author":[{"given":"Nathaniel Wesley","family":"Filardo","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Ateniese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1007\/11523468_54","volume-title":"Automata, Languages and Programming","author":"M. Abadi","year":"2005","unstructured":"Abadi, M., Warinschi, B.: Password-Based Encryption Analyzed. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 664\u2013676. Springer, Heidelberg (2005)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Abeni, P., Baltatu, M., D\u2019Alessandro, R.: User authentication based on face recognition with support vector machines. In: CRV 2006: Proceedings of the The 3rd Canadian Conference on Computer and Robot Vision, p. 42. IEEE Computer Society (2006)","DOI":"10.1109\/CRV.2006.83"},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput.\u00a0129(2), 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"issue":"1-2","key":"13_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci.\u00a0250(1-2), 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"13_CR5","unstructured":"Chang, C.C., Yu, T.X.: Sharing a secret gray image in multiple images. In: Proceedings of the First International Symposium on Cyber Worlds, pp. 230\u2013237 (2002)"},{"issue":"1-3","key":"13_CR6","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S. Cimato","year":"2007","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci.\u00a0374(1-3), 261\u2013276 (2007)","journal-title":"Theor. Comput. Sci."},{"key":"13_CR7","unstructured":"Dhamija, R., Perrig, A.: D\u00e9j\u00e0 vu: a user study using images for authentication. In: SSYM 2000: Proceedings of the 9th Conference on USENIX Security Symposium, p. 4. USENIX Association (2000)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput.\u00a038, 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Farzin, H., Abrishami-Moghaddam, H., Moin, M.S.: A novel retinal identification system. EURASIP Journal on Advances in Signal Processing, 10 (2008)","DOI":"10.1155\/2008\/280635"},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1037\/h0055392","volume":"47","author":"P.M. Fitts","year":"1954","unstructured":"Fitts, P.M.: The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology\u00a047(6), 381\u2013391 (1954)","journal-title":"Journal of Experimental Psychology"},{"key":"13_CR11","unstructured":"Greveler, U.: VTANs - eine anwendung visueller kryptographie in der online-sicherheit. In: GI Jahrestagung (2) 2007, pp. 210\u2013214 (2007)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Hick, W.E.: On the rate of gain of information. Quarterly Journal of Experimental Psychology\u00a0(4), 11\u201326 (1952)","DOI":"10.1080\/17470215208416600"},{"issue":"7","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C.: Visual cryptography for color images. Pattern Recognition\u00a036(7), 1619 (2003)","journal-title":"Pattern Recognition"},{"key":"13_CR14","unstructured":"Jain, L., et al. (eds.): Intelligent Biometric Techniques in Fingerprint and Face Recognition. CRC Press (1999)"},{"issue":"3","key":"13_CR15","doi-asserted-by":"publisher","first-page":"33019","DOI":"10.1117\/1.1993625","volume":"14","author":"D. Jin","year":"2005","unstructured":"Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging\u00a014(3), 33019 (2005)","journal-title":"Journal of Electronic Imaging"},{"key":"13_CR16","unstructured":"Kim, M.R., Park, J.H., Zheng, Y.: Human-machine identification using visual cryptography. In: Proc. the 6th IEEE Int. Workshop on Intelligent Signal Processing and Communication Systems, pp. 178\u2013182 (1998)"},{"key":"13_CR17","unstructured":"Laboratories, R.: Pkcs #5: Password-based cryptography standard, v2.0 (1999), ftp:\/\/ftp.rsasecurity.com\/pub\/pkcs\/pkcs-5v2\/pkcs5v2-0.pdf"},{"key":"13_CR18","unstructured":"Lenovo: Thinkvantage\u00ae\u00a0 client security solution, http:\/\/www.pc.ibm.com\/us\/think\/thinkvantagetech\/security.html"},{"key":"13_CR19","unstructured":"Ltda., A.S.: Fingerauth password manager, http:\/\/www.fingerauth.com\/"},{"issue":"2 & 3","key":"13_CR20","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1207\/S15327051HCI172&3_2","volume":"17","author":"S.I. Mackenzie","year":"2002","unstructured":"Mackenzie, S.I., Soukoreff, W.R.: Text entry for mobile computing: Models and methods, theory and practice. Human-Computer Interaction\u00a017(2 & 3), 147\u2013198 (2002)","journal-title":"Human-Computer Interaction"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. Tech. rep. (1994)","DOI":"10.1007\/BFb0053419"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M. Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 322\u2013336. Springer, Heidelberg (1997)"},{"key":"13_CR23","unstructured":"OpenIntents: OI Safe, http:\/\/www.openintents.org\/en\/node\/205"},{"key":"13_CR24","unstructured":"Paul, N., Evans, D., Rubin, A.D., Wallach, D.S.: Authentication for remote voting. In: Workshop on Human-Computer Interaction and Security Systems (2003)"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Pavaday, N., Soyjaudah, K.: A comparative study of secret code variants in terms of keystroke dynamics, pp. 133\u2013140 (2008)","DOI":"10.1109\/CRISIS.2008.4757473"},{"key":"13_CR26","unstructured":"Admit\u00a0One Security: Keystroke dynamics, http:\/\/www.biopassword.com\/keystroke_dynamics_advantages.asp"},{"issue":"3","key":"13_CR27","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C.N. Yang","year":"2000","unstructured":"Yang, C.N., Laih, C.S.: New colored visual secret sharing schemes. Des. Codes Cryptography\u00a020(3), 325\u2013336 (2000)","journal-title":"Des. Codes Cryptography"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Youmaran, R., Adler, A., Miri, A.: An improved visual cryptography scheme for secret hiding. In: 23rd Biennial Symposium on Communications, pp. 340\u2013343 (2006)","DOI":"10.1109\/BSC.2006.1644637"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T19:50:46Z","timestamp":1742845846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}