{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:25:48Z","timestamp":1725517548597},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540694021"},{"type":"electronic","value":"9783540694038"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69403-8_21","type":"book-chapter","created":{"date-parts":[[2008,8,20]],"date-time":"2008-08-20T12:02:48Z","timestamp":1219233768000},"page":"173-181","source":"Crossref","is-referenced-by-count":1,"title":["User Dynamics in Graphical Authentication Systems"],"prefix":"10.1007","author":[{"given":"Kenneth","family":"Revett","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Jahankhani","sequence":"additional","affiliation":[]},{"given":"S\u00e9rgio Tenreiro","family":"de Magalh\u00e3es","sequence":"additional","affiliation":[]},{"given":"Henrique M. D.","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-1-4471-0515-2_27","volume-title":"People and Computers XIV - Usability or Else, Proceedings of HCI 2000","author":"S. Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords: A field trial investigation. In: McDonald, S., et al. (eds.) People and Computers XIV - Usability or Else, Proceedings of HCI 2000, pp. 405\u2013424. Springer, Heidelberg (2000)"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"G.A. Miller","year":"1956","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review\u00a063, 81\u201397 (1956)","journal-title":"Psychological Review"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1017\/S0140525X01003922","volume":"24","author":"N. Cowan","year":"2001","unstructured":"Cowan, N.: The magical number 4 in short-term memory: A reconsideration of mental storage capacity. Behavioral and Brain Sciences\u00a024, 87\u2013185 (2001)","journal-title":"Behavioral and Brain Sciences"},{"key":"21_CR4","unstructured":"Klein, D.: Foiling the cracker: A survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Security Workshop, pp. 5\u201314 (1990)"},{"key":"21_CR5","unstructured":"Van Oorschot, P.C., Thorpe, J.: On the Security of Graphical Password Schemes. Technical Report TR-05-12, Carleton University, Canada (2005)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Fourth ACM Conference on Computer and Communications Security, Zurich, Switzerland, pp. 48\u201356 (1997)","DOI":"10.1145\/266420.266434"},{"key":"21_CR7","unstructured":"Revett, K.: On the Use of Multiple Sequence Alignment for User Authentication via Keystroke Dynamics. In: International Conference on Global eSecurity 2007 (ICGeS), University of East London, April 16-18, pp. 112\u2013120 (2007)"},{"issue":"6","key":"21_CR8","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1037\/h0055392","volume":"47","author":"P.M. Fitts","year":"1954","unstructured":"Fitts, P.M.: The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology\u00a047(6), 381\u2013391 (1954)","journal-title":"Journal of Experimental Psychology"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Accot, J., Zhai, S.: Refining Fitts law models for bivariate pointing. In: Proceedings of ACM CHI 2003 Conference on Human Factors in Computing Systems, pp. 193\u2013200 (2003)","DOI":"10.1145\/642611.642646"}],"container-title":["Communications in Computer and Information Science","Global E-Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69403-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T05:32:10Z","timestamp":1551504730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69403-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540694021","9783540694038"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69403-8_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2008]]}}}