{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:55:54Z","timestamp":1729666554705,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802931","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"69-76","source":"Crossref","is-referenced-by-count":1,"title":["The pattern-richness of Graphical passwords"],"prefix":"10.1109","author":[{"given":"Johannes S.","family":"Vorster","sequence":"first","affiliation":[]},{"given":"Renier P.","family":"van Heerden","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0080-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284685"},{"key":"ref37","first-page":"375","article-title":"Graphical passwords: A qualitative study of password patterns","author":"armis-tead","year":"2015","journal-title":"The Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS 2015) Academic Conferences Limited"},{"key":"ref36","article-title":"A study of perceptions of graphical passwords","volume":"14","author":"vorster","year":"2015","journal-title":"Journal of Information Warfare"},{"key":"ref35","first-page":"272","article-title":"Heuristic attacks against graphical password generators","author":"peach","year":"2010","journal-title":"Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)"},{"journal-title":"A Framework for the Implementation of Graphical Passwords","year":"2014","author":"vorster","key":"ref34"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1315245.1315252","article-title":"Do background images improve draw a secret graphical passwords?","author":"dunphy","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security ACM"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037440"},{"key":"ref13","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","volume":"10","author":"aviv","year":"2010","journal-title":"WOOT"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572560"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2312547"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.07.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref28","first-page":"11","article-title":"On user choice in graphical password schemes","volume":"13","author":"davis","year":"0"},{"key":"ref4","article-title":"The design and analysis of graphical passwords","author":"jermyn","year":"1999","journal-title":"Usenix Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.091"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/BFb0053751","article-title":"A user identification system using signature written with mouse","author":"syukri","year":"1998","journal-title":"Information Security and Privacy"},{"key":"ref6","first-page":"4","article-title":"Deja vu-a user study: Using images for authentication","volume":"9","author":"dhamija","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280682"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0411"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"journal-title":"Graphical password us patent 5559961 lucent technologies","year":"1995","author":"blonder","key":"ref2"},{"journal-title":"Pass-Go A New Graphical Password Scheme","year":"2006","author":"tao","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660364"},{"key":"ref22","first-page":"10-pp","article-title":"Graphical passwords: A survey","author":"suo","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"ref23","first-page":"105","article-title":"A shoulder-surfing resistant graphical password scheme-wiw","author":"man","year":"2003","journal-title":"Security and Management Citeseer"},{"key":"ref26","first-page":"161","article-title":"A simple text-based shoulder surfing resistant graphical password scheme","author":"chen","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2010.34"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802931.pdf?arnumber=7802931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T12:18:39Z","timestamp":1658319519000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802931","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}