{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:17:24Z","timestamp":1725751044728},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/rcis.2018.8406648","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T22:52:35Z","timestamp":1531176755000},"page":"1-11","source":"Crossref","is-referenced-by-count":12,"title":["Security analysis and psychological study of authentication methods with PIN codes"],"prefix":"10.1109","author":[{"given":"Xavier","family":"Bultel","sequence":"first","affiliation":[]},{"given":"Jannik","family":"Dreier","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Giraud","sequence":"additional","affiliation":[]},{"given":"Marie","family":"Izaute","sequence":"additional","affiliation":[]},{"given":"Timothee","family":"Kheyrkhah","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[]},{"given":"Dounia","family":"Lakhzoum","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Marlin","sequence":"additional","affiliation":[]},{"given":"Ladislav","family":"Mota","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"ref10","article-title":"Deja vu-a user study: Using images for authentication","author":"dhamija","year":"2000","journal-title":"9th USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2017.088196"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017MUP0012"},{"key":"ref14","first-page":"1","article-title":"The design and analysis of graphical passwords","author":"jermyn","year":"1999","journal-title":"Proceedings of the 8th conference on USENIX Security Symposium - Volume 8 SSYM'99"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1992.11995869"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307671"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3036699.3036712"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-120710-100422"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.43"},{"key":"ref3","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"4th USENIX Workshop on Offensive Technologies"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1422"},{"key":"ref8","first-page":"151","article-title":"On user choice in graphical password schemes","author":"davis","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/0963721409359277"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"ref1","article-title":"Stirling Numbers of the Second Kind","author":"abramowitz","year":"1972","journal-title":"Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables"},{"key":"ref20","first-page":"46","article-title":"Heat of the moment: Characterizing the efficacy of thermal camera-based attacks","author":"mowery","year":"2011","journal-title":"5th USENIX Workshop on Offensive Technologies"},{"journal-title":"Usability Engineering","year":"1993","author":"nielsen","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.33"},{"journal-title":"Combinatorial Identities","year":"1979","author":"riordan","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2725199"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"journal-title":"Diffusion of Innovations","year":"1995","author":"rogers everett","key":"ref25"}],"event":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2018,5,29]]},"location":"Nantes","end":{"date-parts":[[2018,5,31]]}},"container-title":["2018 12th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8401323\/8406639\/08406648.pdf?arnumber=8406648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T07:46:15Z","timestamp":1533023175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/rcis.2018.8406648","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}