{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:56:29Z","timestamp":1762390589070},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,2,12]],"date-time":"2014-02-12T00:00:00Z","timestamp":1392163200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10207-014-0228-y","type":"journal-article","created":{"date-parts":[[2014,2,11]],"date-time":"2014-02-11T11:50:03Z","timestamp":1392119403000},"page":"421-437","source":"Crossref","is-referenced-by-count":15,"title":["Analysis of a two-factor graphical password scheme"],"prefix":"10.1007","volume":"13","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,12]]},"reference":[{"key":"228_CR1","unstructured":"Barak, A.: MOSIX $$^{\\textregistered }$$ \u00ae Cluster and Multicluster Management 2009. http:\/\/www.mosix.org"},{"key":"228_CR2","doi-asserted-by":"crossref","unstructured":"Bicakci, K., Atalay, N.B., Yuceel, M., Gurbaslar, H., Erdeniz, B.: Towards usable solutions to graphical password hotspot problem. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference, pp. 318\u2013323. IEEE (2009)","DOI":"10.1109\/COMPSAC.2009.153"},{"key":"228_CR3","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.C.: Graphical Passwords: Learning from the First Generation. Technical Report TR-09-09, School of Computer Science, Carleton University (2009)"},{"key":"228_CR4","unstructured":"Blonder, G.E.: Graphical Passwords. Lucent Technologies Inc, Murray Hill, NJ (US), US Patent No. 5559961 (1996)"},{"key":"228_CR5","doi-asserted-by":"crossref","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Galdi, C.: $$\\text{ H }_{{\\rm yppocrates}}$$ H yppocrates : a new proactive password checker. J. Syst. Softw. 71(1\u20132), 163\u2013175 (2004)","DOI":"10.1016\/S0164-1212(03)00004-9"},{"key":"228_CR6","doi-asserted-by":"crossref","unstructured":"Catuogno, L., Galdi, C.: A graphical pin authentication mechanism for smart cards and low-cost devices. In: Proceedings of the 2nd Workshop on Information Security Theory and Practices (WISTP 08) Sevilla (Spain), May 13\u201316, Volume 5019 of Lecture Notes in Computer Science. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-79966-5_2"},{"key":"228_CR7","unstructured":"Catuogno, L., Galdi, C.: On the security of a two-factor authentication scheme. In: Proceedings of the 4th Workshop on Information Security Theory and Practices (WISTP 2010) Passau (Germany), April 12\u201314, 2010, Volume to Appear of Lecture Notes in Computer Science. Springer, Berlin (2010)"},{"key":"228_CR8","doi-asserted-by":"crossref","unstructured":"Ciaramella, A., D\u2019Arco, P., De Santis, A.,, Galdi, C., Tagliaferri, R.: Neural network techniques for proactive password checking. IEEE Trans. Dependable Secure Comput. 3(4), 327\u2013339 (2006)","DOI":"10.1109\/TDSC.2006.53"},{"key":"228_CR9","doi-asserted-by":"crossref","unstructured":"De Luca, A., von Zezschwitz, E., Hussmann, H., Vibrapass: secure authentication based on shared lies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI \u201909, pp. 913\u2013916. ACM, New York, NY, USA (2009)","DOI":"10.1145\/1518701.1518840"},{"key":"228_CR10","doi-asserted-by":"crossref","unstructured":"De Luca, A., Denzel, M., Hussmann, H.: Look into my eyes! Can you guess my password? In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 7. ACM (2009)","DOI":"10.1145\/1572532.1572542"},{"key":"228_CR11","unstructured":"Dhamija, R., Perring, A.: D\u00e8j\u00e1 vu: a user study using images for authentication, pp. 14\u201317. In: IX USENIX UNIX Security Symposium, Denver, CO, USA (August 2000)"},{"key":"228_CR12","doi-asserted-by":"crossref","unstructured":"Gao, H., Liu, X.: A new graphical password scheme against spyware by using captcha. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15\u201317, 2009, ACM International Conference Proceeding Series. ACM (2009)","DOI":"10.1145\/1572532.1572560"},{"key":"228_CR13","doi-asserted-by":"crossref","unstructured":"Golle, P., Wagner, D.: Cryptanalysis of a cognitive authentication scheme (extended abstract). In: IEEE Symposium on Security and Privacy, pp. 66\u201370. IEEE Computer Society (2007)","DOI":"10.1109\/SP.2007.13"},{"key":"228_CR14","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1073\/pnas.95.5.2703","volume":"95","author":"CL Grady","year":"1998","unstructured":"Grady, C.L., Mcintosh, A.R., Craik, F.I.M.: Neural correlates of the episodic encoding of pictures and words. Proc. Natl. Acad. Sci. USA 95, 2703\u20132708 (1998)","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"228_CR15","doi-asserted-by":"crossref","unstructured":"Harada, A., Isarida, T., Mizuno, T., Nishigaki, M.: A user authentication system using schema of visual memory. In: Biologically Inspired Approaches to Advanced Information Technology: Second International Workshop, Bioadit 2006, Osaka, Japan 26\u201327, 2006, Proceedings, volume 3853 of Lecture Notes in Computer Science, pp. 338\u2013345. Springer, Berlin (2006)","DOI":"10.1007\/11613022_28"},{"key":"228_CR16","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Dhamija, R., Christin, N., Perrig, A.: Use your illusion: secure authentication usable anywhere. In: Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 35\u201345. ACM, New York, NY, USA (2008)","DOI":"10.1145\/1408664.1408670"},{"key":"228_CR17","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pp. 52\u201366. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45682-1_4"},{"key":"228_CR18","unstructured":"International Organization for Standardization (ISO): Ergonomics of Human\u2013System Interaction. ISO 9241 (1998)"},{"key":"228_CR19","doi-asserted-by":"crossref","unstructured":"Jain, H., Bartzis, C., Clarke, E.M.: Satisfiability checking of non-clausal formulas using general matings. In: Biere, A., Gomes, C.P. (eds.), SAT, volume 4121 of Lecture Notes in Computer Science, pp. 75\u201389. Springer, Berlin (2006)","DOI":"10.1007\/11814948_10"},{"key":"228_CR20","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/11967668_5","volume":"4377","author":"H Jameel","year":"2006","unstructured":"Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human identification through image evaluation using secret predicates. Lect. Notes Comput. Sci. 4377, 67 (2006)","journal-title":"Lect. Notes Comput. Sci."},{"key":"228_CR21","doi-asserted-by":"crossref","unstructured":"Jensen, W., Gavrila, S., Korolev, V., Ayers, R., Swanstrom, R.: Picture password: a visual login technique for mobile devices. In: National Institute of Standards and Technologies Interagency Report, volume NISTIR 7030 (2003)","DOI":"10.6028\/NIST.IR.7030"},{"key":"228_CR22","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX security Symposium, Washington, DC, USA (August 23\u201326 1999)"},{"key":"228_CR23","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology\u2014CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science, pp. 293\u2013308. Springer, Berlin (2005)","DOI":"10.1007\/11535218_18"},{"key":"228_CR24","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Symposium On Usable Privacy and Security (SOUPS) (2007)","DOI":"10.1145\/1280680.1280683"},{"key":"228_CR25","doi-asserted-by":"crossref","unstructured":"Matsumoto, T.: Human\u2013computer cryptography: an attempt. In: ACM Conference on Computer and Communications Security, pp. 68\u201375 (1996)","DOI":"10.1145\/238168.238190"},{"key":"228_CR26","unstructured":"NagraID Security. Display Cards. February 2011"},{"key":"228_CR27","unstructured":"Real User Coorp: Pass Faces. http:\/\/www.realuser.com (1998)"},{"key":"228_CR28","doi-asserted-by":"crossref","unstructured":"Roth, V., Richter, K., Freidinger, R.: A pin-entry method resilient against shoulder surfing. In: CCS \u201904: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 236\u2013245. ACM Press, New York, NY, USA (2004)","DOI":"10.1145\/1030083.1030116"},{"key":"228_CR29","doi-asserted-by":"crossref","unstructured":"Salehi-Abari, A., Thorpe, J., van Oorschot, PC: On purely automated attacks and click-based graphical passwords. In: Proceedings of the 2008 Annual Computer Security Applications Conference, pp. 111\u2013120. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/ACSAC.2008.18"},{"key":"228_CR30","doi-asserted-by":"crossref","unstructured":"Sasamoto, H., Christin, N., Hayashi, E.: Undercover: authentication usable in front of prying eyes. In: CHI\u201908 Proceedings of the SIGCHI conference on human factors in computing systems, pp. 183\u2013192. ACM, New York (2008)","DOI":"10.1145\/1357054.1357085"},{"key":"228_CR31","unstructured":"Sobrado, L., Birget, J.C.: Graphical password. Rutgers Scholar Electron. Bull. Undergrad. Res. 4 (2002)"},{"key":"228_CR32","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: a survey. In: Proceedings of 21st Annual Computer Security Application Conference (ACSAC 2005) December 5\u20139, pp. 463\u2013472. Tucson, AZ, USA (December 2005)"},{"key":"228_CR33","unstructured":"Takada, T.: FakePointer: an authentication scheme for improving security against peeping attacks using video cxameras. In: The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008 (UBICOMM \u201908), pp. 395\u2013400 (2008)"},{"key":"228_CR34","doi-asserted-by":"crossref","unstructured":"Thiffault, C., Bacchus, F., Walsh, T.: Solving non-clausal formulas with dpll search. In: Wallace, M., (ed.), CP, volume 3258 of Lecture Notes in Computer Science, pp. 663\u2013678. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-30201-8_48"},{"key":"228_CR35","unstructured":"Thorpe, J., van Oorschot, P.C.: Human-seeded attacks and exploiting hot-spots in graphical passwords. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium Table of Contents. USENIX Association Berkeley, CA, USA (2007)"},{"key":"228_CR36","unstructured":"University of British Columbia: Ubcsat, the Stochastic Local Search Sat Solver. http:\/\/www.satlib.org\/ubcsat"},{"key":"228_CR37","unstructured":"Varenhorst, C., et al.: Passdoodles: A Lightweight Authentication Method. Research Science Institute (2004)"},{"key":"228_CR38","doi-asserted-by":"crossref","unstructured":"Weinshall, D.: Cognitive authentication schemes safe against spyware (short paper). In: IEEE Symposium on Security and Privacy, pp. 295\u2013300. IEEE Computer Society (2006)","DOI":"10.1109\/SP.2006.10"},{"issue":"1\u20132","key":"228_CR39","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Human\u2013Comput Stud. 63(1\u20132), 102\u2013127 (2005)","journal-title":"Int. J. Human\u2013Comput Stud."},{"key":"228_CR40","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of Advanced Visual Interface,s AVI 2006, Venice, Italy (May 23\u201326 2006)","DOI":"10.1145\/1133265.1133303"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0228-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-014-0228-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0228-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T14:26:41Z","timestamp":1565188001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-014-0228-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,12]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["228"],"URL":"https:\/\/doi.org\/10.1007\/s10207-014-0228-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,12]]}}}