{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:06:16Z","timestamp":1760346376025},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/tmc.2014.2307331","type":"journal-article","created":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T19:03:33Z","timestamp":1392923013000},"page":"2566-2579","source":"Crossref","is-referenced-by-count":31,"title":["Keylogging-Resistant Visual Authentication Protocols"],"prefix":"10.1109","volume":"13","author":[{"given":"DaeHun","family":"Nyang","sequence":"first","affiliation":[]},{"given":"Aziz","family":"Mohaisen","sequence":"additional","affiliation":[]},{"given":"Jeonil","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052245"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0412"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.150"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280701"},{"key":"ref30","year":"0"},{"key":"ref37","article-title":"TOTP: Time-Based One-Time Password Algorithm","author":"mraihi","year":"0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382202"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023425"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"ref27","author":"krawczyk","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.50"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_1"},{"key":"ref24","year":"0"},{"key":"ref23","year":"0"},{"key":"ref26","author":"katz","year":"2008","journal-title":"Introduction to Modern Cryptography"},{"key":"ref25","first-page":"58","article-title":"Dynamic Pharming Attacks and Locked Same-Origin Policies","author":"karlof","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Comm Security (CCS)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484318"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"ref10","article-title":"Graphical Password Authentication Using Cued Click Points","author":"chiasson","year":"2008","journal-title":"Proc 12th European Symp Research in Computer Security (ESORICS)"},{"key":"ref11","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/24592.24594"},{"key":"ref12","article-title":"On User Choice in Graphical Password Schemes","author":"davis","year":"2004","journal-title":"Proc 13th Conf Usenix Security Symp"},{"key":"ref13","author":"doraswamy","year":"2003","journal-title":"Ipsec The New Security Standard for the Internet Intranets and Virtual Private Networks"},{"key":"ref14","author":"farb","year":"2011","journal-title":"A Perrig ?SafeSlinger An Easy-to-Use and Secure Approach for Human Trust Establishment"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"ref17","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"ref19","article-title":"How to Login from an Internet Caf\ufffd without Worrying about Keyloggers","author":"herley","year":"2006","journal-title":"Proc ACM Symp Usable Privacy and Security (SOUPS)"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"ref5","year":"0"},{"key":"ref8","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref49","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409957"},{"key":"ref46","first-page":"635","article-title":"Your Botnet is My Botnet: Analysis of a Botnet Takeover","author":"gross","year":"2009","journal-title":"Proc ACM Conf Computer and Comm Security (CCS)"},{"key":"ref45","first-page":"191","article-title":"Kerberos: An Authentication Service for Open Networks","author":"steiner","year":"1988","journal-title":"Proc USENIX Ann Technical Conf"},{"key":"ref48","article-title":"Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords","author":"thorpe","year":"2007","journal-title":"Proc Usenix Security"},{"key":"ref47","article-title":"Graphical Passwords: A Survey","author":"suo","year":"2005","journal-title":"Proc IEEE 21st Ann Computer Security Applications Conf"},{"key":"ref42","year":"0"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519073"},{"key":"ref43","author":"rescorla","year":"2001","journal-title":"SSL and TLS Designing and Building Secure Systems"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/6913596\/06746187.pdf?arnumber=6746187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:52:30Z","timestamp":1642006350000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6746187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":51,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2014.2307331","relation":{},"ISSN":["1536-1233"],"issn-type":[{"value":"1536-1233","type":"print"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}