{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T17:30:36Z","timestamp":1746207036661,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750228","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"388-393","source":"Crossref","is-referenced-by-count":3,"title":["Towards the design of a film-based graphical password scheme"],"prefix":"10.1109","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1133265.1133303"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/TDSC.2006.53"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/1920261.1920288"},{"key":"15","first-page":"7","article-title":"Look into my eyes! can you guess my password?","author":"de luca","year":"2009","journal-title":"Proc ACM Symp Usable Privacy Security"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1016\/S0164-1212(03)00004-9"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1572532.1572560"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1280680.1280683"},{"key":"11","first-page":"7030","article-title":"Picture password a visual login technique for mobile devices","author":"jensen","year":"2003","journal-title":"National Institute of Standards and Technology Interagency Report"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1408664.1408670"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/978-3-642-17711-8_28"},{"key":"20","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/11967668_5","article-title":"Human identification through image evaluation using secret predicates","volume":"4377","author":"jameel","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/TSMCC.2008.919173"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/TSMCC.2009.2023380"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TMM.2011.2168948"},{"year":"2013","journal-title":"YouTube Fact Sheet","key":"25"},{"key":"3","first-page":"295","article-title":"Cognitive authentication schemes safe against spyware (short paper)","author":"weinshall","year":"2006","journal-title":"IEEE Symposium on Security and Privacy IEEE Computer Society"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/SP.2007.13"},{"key":"10","article-title":"Deja vu a user study using images for authentication","author":"dhamija","year":"2000","journal-title":"IX USENIX UNIX Security Symposium"},{"year":"1998","key":"1"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"6","first-page":"463","article-title":"Graphical passwords a survey","author":"suo","year":"2005","journal-title":"Proc of the Annual Computer Security Application Conference"},{"key":"5","article-title":"On the security of a two-factor authentication scheme","volume":"6033","author":"catuogno","year":"2010","journal-title":"Proceedings of the 4th Workshop on Information Security Theory and Practices (WISTP 2010) Passau (Germany)"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1007\/978-3-540-79966-5_2"},{"year":"1996","author":"blonder","journal-title":"Graphical passwords","key":"9"},{"key":"8","article-title":"The design and analysis of graphical passwords","author":"jermyn","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750228.pdf?arnumber=6750228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:27:39Z","timestamp":1498112859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750228","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}