{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:49Z","timestamp":1761621229588,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7249465","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:40:36Z","timestamp":1441946436000},"page":"7139-7144","source":"Crossref","is-referenced-by-count":6,"title":["TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords"],"prefix":"10.1109","author":[{"given":"Hongji","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kaigui","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753488"},{"key":"ref3","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","volume":"10","author":"aviv","year":"2010","journal-title":"WOOT"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2371574.2371582","article-title":"The fat thumb: using the thumb's contact size for single-handed mobile interaction","author":"boring","year":"2012","journal-title":"Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/DSN.2010.5544311","article-title":"Keystroke biometrics with number-pad input","author":"maxion","year":"2010","journal-title":"Dependable Systems and Networks (DSN) 2010 IEEE\/IFIP International Conference on"},{"key":"ref7","article-title":"Novel shoulder-surfing resistant haptic-based graphical password","volume":"6","author":"malek","year":"2006","journal-title":"Proc Eurohaptics"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"journal-title":"Android Developers MotionEvent","year":"0","key":"ref1"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07249465.pdf?arnumber=7249465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T23:43:43Z","timestamp":1691970223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7249465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7249465","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}