{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:02:22Z","timestamp":1730239342294,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/ice.2018.8436303","type":"proceedings-article","created":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T22:02:46Z","timestamp":1534456966000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Securing Web Accounts by Graphical Password and Voice Notification"],"prefix":"10.1109","author":[{"given":"Viorel","family":"Lupu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.084"},{"key":"ref11","article-title":"A secured graphical password authentication system","volume":"2","author":"mathuri pandi","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"journal-title":"Spectre Attacks Exploiting Speculative Execution","year":"2018","author":"kocher","key":"ref12"},{"journal-title":"Constructive assembly and method for granting authorized access to an Internet service platform","year":"2016","key":"ref13"},{"journal-title":"Authentication","year":"2018","key":"ref14"},{"key":"ref15","article-title":"Securing web accounts using graphical password authentication through watermarking","volume":"9","author":"khetani","year":"2004","journal-title":"International Journal of Computer Trends and Technology (IJCTT)"},{"journal-title":"Securing the mobile banking channel","year":"2014","key":"ref16"},{"key":"ref4","article-title":"On the Security of Picture Gesture Authentication","author":"zhao","year":"2013","journal-title":"Proc 22nd USENIX Security Symp"},{"journal-title":"User interface design affects security Patterns in click-based graphical passwords","year":"2009","author":"chiasson","key":"ref3"},{"journal-title":"Essentials for Successful Nfc Mobile Ecosystems","year":"2008","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63-2"},{"journal-title":"OTP security past its expiration date","year":"2014","key":"ref8"},{"key":"ref7","article-title":"Comparison of graphical password authentication techniques","volume":"116","author":"bhanushali","year":"2015","journal-title":"International Journal of Computer Applications (0975&#x2013;8887)"},{"key":"ref2","article-title":"PassImages: An alternative method of user authentication","volume":"2","author":"charruau","year":"2004","journal-title":"Advances in Networks Computing and Communications 4"},{"journal-title":"EU General Data Protection Directive (GDPR)","year":"2018","key":"ref1"},{"journal-title":"Usable Authentication and click-based graphical passwords","year":"2009","author":"chiasson","key":"ref9"}],"event":{"name":"2018 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC)","start":{"date-parts":[[2018,6,17]]},"location":"Stuttgart","end":{"date-parts":[[2018,6,20]]}},"container-title":["2018 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423590\/8436243\/08436303.pdf?arnumber=8436303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:00:05Z","timestamp":1643209205000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8436303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ice.2018.8436303","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}