{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:15Z","timestamp":1740137355464,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10207-022-00636-0","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T17:05:51Z","timestamp":1670259951000},"page":"403-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO\/IEC 25022"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4967-3938","authenticated-orcid":false,"given":"Kailash Chandra","family":"Mishra","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Subrata","family":"Dutta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"636_CR1","doi-asserted-by":"publisher","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium, pp. 200\u2013203 (1999). https:\/\/doi.org\/10.1109\/ICCIIS.2010.35","DOI":"10.1109\/ICCIIS.2010.35"},{"issue":"1\u20132","key":"636_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud. 63(1\u20132), 102 (2005). https:\/\/doi.org\/10.1016\/j.ijhcs.2005.04.010","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"636_CR3","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Van\u00a0Oorschot, P.C., Biddle, R.: Graphical password authentication using cued click points. In: European Symposium on Research in Computer Security, pp. 359\u2013374. Springer (2007)","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"636_CR4","unstructured":"Google Street View. https:\/\/en.wikipedia.org\/wiki\/Google_Street_View"},{"key":"636_CR5","unstructured":"Street View. https:\/\/developers.google.com\/maps\/documentation\/javascript\/streetview"},{"key":"636_CR6","unstructured":"Discover Street View and contribute your own imagery to Google Maps. https:\/\/www.google.com\/streetview\/"},{"key":"636_CR7","unstructured":"KartaView. https:\/\/kartaview.org\/landing"},{"key":"636_CR8","unstructured":"Mapillary. https:\/\/www.mapillary.com\/"},{"key":"636_CR9","unstructured":"Maps\u2014Apple. https:\/\/www.apple.com\/maps\/"},{"key":"636_CR10","unstructured":"Combinatorics\u2014How many possible combinations in 8 character password?\u2014Mathematics Stack Exchange. https:\/\/math.stackexchange.com\/questions\/739874\/how-many-possible-combinations-in-8- character-password"},{"key":"636_CR11","unstructured":"Database design\u2014What are the lengths of Location Coordinates, latitude and longitude?\u2014Stack Overflow. https:\/\/stackoverflow.com\/questions\/15965166\/what-are-the-lengths-of-location-coordinates-latitude-and-longitude"},{"key":"636_CR12","unstructured":"Future Online Password Could be a Map. https:\/\/news.yahoo.com\/future-online-password-could-map.html"},{"issue":"2","key":"636_CR13","first-page":"7","volume":"26","author":"J Spitzer","year":"2010","unstructured":"Spitzer, J., Singh, C., Schweitzer, D.: A security class project in graphical passwords. J. Comput. Sci. Coll. 26(2), 7 (2010)","journal-title":"J. Comput. Sci. Coll."},{"key":"636_CR14","doi-asserted-by":"publisher","unstructured":"Sun, H.M., Chen, Y.H., Fang, C.C., Chang, S.Y.: PassMap: a map based graphical-password authentication system. In: ASIACCS 2012\u20147th ACM Symposium on Information, Computer and Communications Security, pp. 99\u2013100 (2012). https:\/\/doi.org\/10.1145\/2414456.2414513","DOI":"10.1145\/2414456.2414513"},{"key":"636_CR15","doi-asserted-by":"crossref","unstructured":"Thorpe, J., MacRae, B., Salehi-Abari, A.: Usability and security evaluation of GeoPass: a geographic location-password scheme. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, pp. 1\u201314 (2013)","DOI":"10.1145\/2501604.2501618"},{"key":"636_CR16","doi-asserted-by":"crossref","unstructured":"Al-Ameen, M.N., Wright, M.: Multiple-password interference in the geopass user authentication scheme. In: Proc. Workshop Usable Secur. (USEC), pp. 1\u20136 (2015)","DOI":"10.14722\/usec.2015.23004"},{"issue":"9","key":"636_CR17","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1109\/TIFS.2016.2570681","volume":"11","author":"B MacRae","year":"2016","unstructured":"MacRae, B., Salehi-Abari, A., Thorpe, J.: An exploration of geographic authentication schemes. IEEE Trans. Inf. Forensics Secur. 11(9), 1997 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"June","key":"636_CR18","doi-asserted-by":"publisher","first-page":"3927","DOI":"10.1002\/sec","volume":"5","author":"J Shin","year":"2015","unstructured":"Shin, J., Kancharlapalli, S., Farcasin, M., Chan-Tin, E.: SmartPass: a smarter geolocation-based authentication scheme. Secur. Commun. Netw. 5(June), 3927\u20133938 (2015). https:\/\/doi.org\/10.1002\/sec","journal-title":"Secur. Commun. Netw."},{"key":"636_CR19","doi-asserted-by":"publisher","unstructured":"Meng, W.: RouteMap: a route and map based graphical password scheme for better multiple password memory. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9408, p. 147 (2015). https:\/\/doi.org\/10.1007\/978-3-319-25645-0_10","DOI":"10.1007\/978-3-319-25645-0_10"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00636-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00636-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00636-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T05:14:44Z","timestamp":1679030084000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00636-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["636"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00636-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"5 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}