{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:52Z","timestamp":1740099652323,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811526923"},{"type":"electronic","value":"9789811526930"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2693-0_17","type":"book-chapter","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T07:29:03Z","timestamp":1579159743000},"page":"235-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison Between BlindLogin and Other Graphical Password Authentication Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4105-1037","authenticated-orcid":false,"given":"Yean Li","family":"Ho","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1816-513X","authenticated-orcid":false,"given":"Siong Hoe","family":"Lau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Afizan","family":"Azman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,1,17]]},"reference":[{"key":"17_CR1","unstructured":"Blonder, G.: Graphical password. US patent 5,559,961, field, 30 Aug 1995, and issued 24 Sept 1996 (1996)"},{"key":"17_CR2","unstructured":"Thorpe, J., van Oorschot, P.C.: Towards secure design choices for implementing graphical passwords. In: 20th Annual Computer Security Applications Conference, pp. 50\u201360 (2004)"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3758\/BF03331011","volume":"11","author":"A Paivio","year":"1968","unstructured":"Paivio, A., Rogers, T.B., Smythe, P.C.: Why are pictures easier to recall than words? Psychon. Sci. 11(4), 137\u2013138 (1968)","journal-title":"Psychon. Sci."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Lin, P.L., Weng, L.T., Huang, P.W.: Graphical passwords using images with random tracks of geometric shapes. In: Proceedings - 1st International Congress on Image and Signal Processing, CISP 2008, vol. 3, pp. 27\u201331 (2008)","DOI":"10.1109\/CISP.2008.603"},{"issue":"5","key":"17_CR5","first-page":"145","volume":"8","author":"WZ Khan","year":"2011","unstructured":"Khan, W.Z., Aalsalem, M.Y., Xiang, Y.: A graphical password based system for small mobile devices. Int. J. Comput. Sci. Issues 8(5), 145\u2013154 (2011)","journal-title":"Int. J. Comput. Sci. Issues"},{"issue":"2","key":"17_CR6","first-page":"1","volume":"2","author":"PP Ray","year":"2012","unstructured":"Ray, P.P.: Ray\u2019s scheme: graphical password based hybrid authentication system for smart hand held devices. J. Inf. Eng. Appl. 2(2), 1\u201312 (2012)","journal-title":"J. Inf. Eng. Appl."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proceedings of the Ninth Symposium on Usable Privacy and Security - SOUPS 2013 (2013)","DOI":"10.1145\/2501604.2501619"},{"issue":"3","key":"17_CR8","doi-asserted-by":"publisher","first-page":"256","DOI":"10.3758\/BF03213172","volume":"4","author":"RE Gehring","year":"1976","unstructured":"Gehring, R.E., Toglia, M.P., Kimble, G.A.: Recognition memory for words and pictures at short and long retention intervals. Mem. Cogn. 4(3), 256\u2013260 (1976)","journal-title":"Mem. Cogn."},{"issue":"1\u20132","key":"17_CR9","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A Angeli De","year":"2005","unstructured":"De Angeli, A., Coventry, L., Johnson, G., Renaud, K.: Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int. J. Hum Comput Stud. 63(1\u20132), 128\u2013152 (2005)","journal-title":"Int. J. Hum Comput Stud."},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3758\/s13421-010-0015-6","volume":"39","author":"RJ Crutcher","year":"2014","unstructured":"Crutcher, R.J., Beer, J.M.: An auditory analog of the picture superiority effect. Mem. Cogn. 39(1), 63\u201374 (2014)","journal-title":"Mem. Cogn."},{"issue":"7","key":"17_CR11","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1080\/17470218.2016.1183686","volume":"70","author":"ME Gloede","year":"2017","unstructured":"Gloede, M.E., Paulauskas, E.E., Gregg, M.K.: Experience and information loss in auditory and visual memory. Q. J. Exp. Psychol. 70(7), 1344\u20131352 (2017)","journal-title":"Q. J. Exp. Psychol."},{"key":"17_CR12","unstructured":"Oates, J.M., Reder, L.M.: Memory for pictures: sometimes a picture is not worth a single word. In: Benjamin, A.S. (ed.) Successful Remembering and Successful Forgetting: A Festschrift in Honor of Robert A. Bjork, pp. 447\u2013462 (2010)"},{"key":"17_CR13","unstructured":"Ho, Y.L., Azman, A., Lau, S.H.: An analysis of graphical user authentication systems. In: 9th International Conference on IT in Asia (CITA 2015) (2015)"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"551","DOI":"10.3844\/ajassp.2017.551.559","volume":"14","author":"YL Ho","year":"2017","unstructured":"Ho, Y.L., Bendrissou, B., Azman, A., Lau, S.H.: BlindLogin: a graphical authentication system with support for blind and visually impaired users on smartphones. Am. J. Appl. Sci. 14, 551\u2013559 (2017)","journal-title":"Am. J. Appl. Sci."},{"key":"17_CR15","unstructured":"Dhamija, R., Perrig, A.: D\u00e9j\u00e0 Vu\u202f: a user study using images for authentication. In: Human Factors (2000)"},{"key":"17_CR16","first-page":"1","volume":"2000","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? Field Trial Invest. HCI 2000, 1\u201320 (2000)","journal-title":"Field Trial Invest. HCI"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Jansen, W., Gavrila, S., Korolev, V., Ayers, R., Swanstrom, R.: Picture password: a visual login technique for mobile devices. NISTIR 7030 (2003)","DOI":"10.6028\/NIST.IR.7030"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Authentication using graphical passwords : effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security (SOUPS 2005), pp. 1\u201312 (2005)","DOI":"10.1145\/1073001.1073002"},{"key":"17_CR19","unstructured":"Yampolskiy, R.V.: User authentication via behavior based passwords. In: Systems, Applications and Technology Conference, 2007. LISAT 2007. IEEE Long Island, pp. 1\u20138 (2007)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Stobert, E., Forget, A., Chiasson, S., Van Oorschot, P.C., Biddle, R.: Exploring usability effects of increasing security in click-based graphical passwords. In: ACSAC 2010, pp. 79\u201388 (2010)","DOI":"10.1145\/1920261.1920273"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Liu, X., Qiu, J., Ma, L., Gao, H., Ren, Z.: A novel cued-recall graphical password scheme. In: 2011 Sixth International Conference on Image and Graphics, pp. 949\u2013956 (2011)","DOI":"10.1109\/ICIG.2011.16"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Sun, H.-M., Chen, Y.-H., Fang, C.-C., Chang, S.-Y.: PassMap: a map based graphical-password authentication system categories and subject descriptors. In: ASIACCS 2012, pp. 2\u20136 (2012)","DOI":"10.1145\/2414456.2414513"},{"key":"17_CR23","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium (1999)"},{"key":"17_CR24","unstructured":"Tao, H.: Pass-Go, a new graphical password scheme. Master\u2019s thesis, School of Information Technology and Engineering, University of Ottawa (2006)"},{"key":"17_CR25","unstructured":"Chakrabarti, S., Landon, G.V., Singal, M.: Graphical passwords: drawing a secret with rotation as a new degree of freedom. In: Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks (AsiaCSN 2007), pp. 114\u2013120 (2007)"},{"key":"17_CR26","unstructured":"Marchetto, J.: pinPass.js: Easy to Use, Easy to Deploy Graphical Passwords, pp. 3\u20135 (n.d.)"},{"key":"17_CR27","unstructured":"Mahansaria, D., Shyam, S., Samuel, A., Teja, R.: A fast and secure software solution [SS7.0] that counters shoulder surfing attack. In: Proceedings of the 13th IASTED International Conference Software Engineering and Applications (SEA 2009), pp. 190\u2013195 (2009)"},{"issue":"5","key":"17_CR28","doi-asserted-by":"publisher","first-page":"765","DOI":"10.4304\/jcp.5.5.765-772","volume":"5","author":"Z Zheng","year":"2010","unstructured":"Zheng, Z., Liu, X., Yin, L., Liu, Z.: A hybrid password authentication scheme based on shape and text. J. Comput. 5(5), 765\u2013772 (2010)","journal-title":"J. Comput."},{"issue":"1","key":"17_CR29","first-page":"1","volume":"1","author":"Z Imran","year":"2011","unstructured":"Imran, Z., Nizami, R.: Advance secure login. Int. J. Sci. Res. Publ. 1(1), 1\u20134 (2011)","journal-title":"Int. J. Sci. Res. Publ."},{"key":"17_CR30","unstructured":"Chen, Y.-L., Ku, W.-C., Yeh, Y.-C., Liao, D.-M.: A simple text-based shoulder surfing resistant graphical password scheme. In: 2013 International Symposium on Next-Generation Electronics, pp. 161\u2013164 (2013)"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 553\u2013567 (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"17_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-642-12654-3_24","volume-title":"Pervasive Computing","author":"MN Bonner","year":"2010","unstructured":"Bonner, M.N., Brudvik, J.T., Abowd, G.D., Edwards, W.K.: No-look notes: accessible eyes-free multi-touch text entry. In: Flor\u00e9en, P., Kr\u00fcger, A., Spasojevic, M. (eds.) Pervasive 2010. LNCS, vol. 6030, pp. 409\u2013426. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12654-3_24"},{"issue":"2","key":"17_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3022701","volume":"9","author":"William Grussenmeyer","year":"2017","unstructured":"Grussenmeyer, W., Folmer, E.: Accessible touchscreen technology for people with visual impairments: a survey. J. ACM Trans. Accessible Comput. (TACCESS) 9(2), Article no. 6 (2017)","journal-title":"ACM Transactions on Accessible Computing"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Biddle, R., van Oorschot, P.C.: A second look at the usability of click-based graphical passwords. In: Symposium on Usable Privacy and Security (SOUPS) 2007, pp. 1\u201312 (2007)","DOI":"10.1145\/1280680.1280682"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2693-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T07:41:06Z","timestamp":1579160466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-2693-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811526923","9789811526930"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2693-0_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}