{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:05:40Z","timestamp":1774368340383,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030116","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"236-245","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":163,"title":["A PIN-entry method resilient against shoulder surfing"],"prefix":"10.1145","author":[{"given":"Volker","family":"Roth","sequence":"first","affiliation":[{"name":"OGM Laboratory LLC"}]},{"given":"Kai","family":"Richter","sequence":"additional","affiliation":[{"name":"ZGDV"}]},{"given":"Rene","family":"Freidinger","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.swiveltechnologies.com July 2004.]]  http:\/\/www.swiveltechnologies.com July 2004.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.hirschelectronics.com\/Products_ScramblePads.asp July 2004.]]  http:\/\/www.hirschelectronics.com\/Products_ScramblePads.asp July 2004.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Apr.","year":"2004","unstructured":"Passfaces. www.realuser.com , Apr. 2004 .]] Passfaces. www.realuser.com, Apr. 2004.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168615"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956458"},{"key":"e_1_3_2_1_6_1","volume-title":"Apr.","author":"BRADER M.","year":"1998","unstructured":"BRADER , M. Shoulder-surfing automated. Risks Digest 19.70 , Apr. 1998 .]] BRADER, M. Shoulder-surfing automated. Risks Digest 19.70, Apr. 1998.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"Chemical combinatorial attacks on keyboards","author":"BRIER E.","year":"2003","unstructured":"BRIER , E. , NACCACHE , D. , AND PAILLIER , P. Chemical combinatorial attacks on keyboards . International Association for Cryptographic Research ePrint Archive 2003 , 217 (2003).]] BRIER, E., NACCACHE, D., AND PAILLIER, P. Chemical combinatorial attacks on keyboards. International Association for Cryptographic Research ePrint Archive 2003, 217 (2003).]]"},{"key":"e_1_3_2_1_8_1","first-page":"189","volume-title":"Usability evaluation in industry","author":"BROOKE J.","year":"1996","unstructured":"BROOKE , J. SUS: A quick and dirty usability scale . In Usability evaluation in industry , P. Jordan, B. Thomas, B. Weerdmeester, and I. McClelland, Eds. Taylor and Francis , London , 1996 , pp. 189 -- 194 .]] BROOKE, J. SUS: A quick and dirty usability scale. In Usability evaluation in industry, P. Jordan, B. Thomas, B. Weerdmeester, and I. McClelland, Eds. Taylor and Francis, London, 1996, pp. 189--194.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Aug.","author":"COLVILLE J.","year":"2003","unstructured":"COLVILLE , J. Atm scam netted $620,000 australian. Risks Digest 22.85 , Aug. 2003 .]] COLVILLE, J. Atm scam netted $620,000 australian. Risks Digest 22.85, Aug. 2003.]]"},{"key":"e_1_3_2_1_10_1","first-page":"37","article-title":"Magnetic stripe technology and beyond","author":"COUNT ZERO","year":"1992","unstructured":"COUNT ZERO . Card-o-rama : Magnetic stripe technology and beyond . Phrack , 37 ( 1992 ).]] COUNT ZERO. Card-o-rama: Magnetic stripe technology and beyond. Phrack, 37 (1992).]]","journal-title":"Phrack"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. 9th USENIX Security Symposium","author":"DHAMIJA R.","year":"2000","unstructured":"DHAMIJA , R. , AND PERRIG , A. D\u00e9 j\u00e0 vu : A user study using images for authentication . In Proc. 9th USENIX Security Symposium ( Denver, CO, USA , Aug. 2000 ).]] DHAMIJA, R., AND PERRIG, A. D\u00e9j\u00e0 vu: A user study using images for authentication. In Proc. 9th USENIX Security Symposium (Denver, CO, USA, Aug. 2000).]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844116"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"ASIACRYPT","author":"HOPPER N. J.","year":"2001","unstructured":"HOPPER , N. J. , AND BLUM , M. Secure human identification protocols . In ASIACRYPT ( 2001 ), C. Boyd, Ed ., vol. 2249 of Lecture Notes in Computer Science , Springer Verlag , pp. 52 -- 66 .]] HOPPER, N. J., AND BLUM, M. Secure human identification protocols. In ASIACRYPT (2001), C. Boyd, Ed., vol. 2249 of Lecture Notes in Computer Science, Springer Verlag, pp. 52--66.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"May","author":"INTERNATIONAL ORGANIZATION FOR STANDARDIZATION.","year":"2002","unstructured":"INTERNATIONAL ORGANIZATION FOR STANDARDIZATION. Banking - Personal Identification Number (PIN) management and security - Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems , May 2002 . TC 68\/SC 6.]] INTERNATIONAL ORGANIZATION FOR STANDARDIZATION. Banking - Personal Identification Number (PIN) management and security - Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems, May 2002. TC 68\/SC 6.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Probability theory for pickpockets - ec-PIN guessing.","author":"KUHN M.","year":"1997","unstructured":"KUHN , M. Probability theory for pickpockets - ec-PIN guessing. Available at http:\/\/www.cl.cam.ac.uk\/~mgk25\/, 1997 .]] KUHN, M. Probability theory for pickpockets - ec-PIN guessing. Available at http:\/\/www.cl.cam.ac.uk\/~mgk25\/, 1997.]]"},{"key":"e_1_3_2_1_17_1","first-page":"4","article-title":"Practical human-machine identification over insecure channels","volume":"3","author":"LI X.-Y.","year":"1999","unstructured":"LI , X.-Y. , AND TENG , S.-H . Practical human-machine identification over insecure channels . Journal of Combinatorial Optimization 3 , 4 ( 1999 ).]] LI, X.-Y., AND TENG, S.-H. Practical human-machine identification over insecure channels. Journal of Combinatorial Optimization 3, 4 (1999).]]","journal-title":"Journal of Combinatorial Optimization"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/3-540-46416-6_35","volume-title":"EUROCRYPT","author":"MATSUMOTO T.","year":"1991","unstructured":"MATSUMOTO , T. , AND IMAI , H. Human identification through insecure channel . In EUROCRYPT ( 1991 ), D. W. Davies, Ed ., vol. 547 of Lecture Notes in Computer Science , Springer Verlag , pp. 409 -- 421 .]] MATSUMOTO, T., AND IMAI, H. Human identification through insecure channel. In EUROCRYPT (1991), D. W. Davies, Ed., vol. 547 of Lecture Notes in Computer Science, Springer Verlag, pp. 409--421.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_20_1","volume-title":"Feb.","author":"MOLLER B.","year":"1997","unstructured":"MOLLER , B. Schwachen des ec-PIN-Verfahrens. Available at http:\/\/www.informatik.tu-darmstadt.de\/TI\/Mitarbeiter\/moeller , Feb. 1997 . Manuscript .]] MOLLER, B. Schwachen des ec-PIN-Verfahrens. Available at http:\/\/www.informatik.tu-darmstadt.de\/TI\/Mitarbeiter\/moeller, Feb. 1997. Manuscript.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043657"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766146"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0049234"},{"key":"e_1_3_2_1_24_1","volume-title":"Psychodiagnostisches Zentrum","author":"PLATH H.-E.","year":"1984","unstructured":"PLATH , H.-E. , AND RICHTER , P. Erm\u00fcdungs-Monotonie- S\u00e4 ttigung-Stress (BM S). Tech. rep ., Psychodiagnostisches Zentrum , Dresden , Germany , 1984 .]] PLATH, H.-E., AND RICHTER, P. Erm\u00fcdungs-Monotonie-S\u00e4ttigung-Stress (BMS). Tech. rep., Psychodiagnostisches Zentrum, Dresden, Germany, 1984.]]"},{"key":"e_1_3_2_1_25_1","unstructured":"SASSE M. A. Computer security: Anatomy of a usability and a plan for recovery. {22}.]]  SASSE M. A. Computer security: Anatomy of a usability and a plan for recovery. {22}.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844117"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90027-7"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(94)90064-7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511755309","volume-title":"Elementary Probability","author":"STIRZAKER D.","year":"2003","unstructured":"STIRZAKER , D. Elementary Probability , 2 nd ed. Cambridge University Press , 2003 .]] STIRZAKER, D. Elementary Probability, 2nd ed. Cambridge University Press, 2003.]]","edition":"2"},{"key":"e_1_3_2_1_30_1","article-title":"Gangs preying on cash machines","author":"SUMMERS C.","year":"2003","unstructured":"SUMMERS , C. , AND TOYNE , S . Gangs preying on cash machines . BBC News Online , Oct. 2003 .]] SUMMERS, C., AND TOYNE, S. Gangs preying on cash machines. BBC News Online, Oct. 2003.]]","journal-title":"BBC News Online"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. 4th NordU Conference","author":"TOM MARKOTTEN D. G.","year":"2002","unstructured":"TOM MARKOTTEN , D. G. User-centered security engineering . In Proc. 4th NordU Conference ( Helsinki, Finland , Feb. 2002 ).]] TOM MARKOTTEN, D. G. User-centered security engineering. In Proc. 4th NordU Conference (Helsinki, Finland, Feb. 2002).]]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02447"},{"key":"e_1_3_2_1_33_1","volume-title":"May","author":"WEINSTOCK C.","year":"1987","unstructured":"WEINSTOCK , C. Atm fraud. Risks Digest 4.86 , May 1987 .]] WEINSTOCK, C. Atm fraud. Risks Digest 4.86, May 1987.]]"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. 9th USENIX Security Symposium (August","author":"WHITTEN A.","year":"1999","unstructured":"WHITTEN , A. , AND TYGAR , J. D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In Proc. 9th USENIX Security Symposium (August 1999 ).]] WHITTEN, A., AND TYGAR, J. D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proc. 9th USENIX Security Symposium (August 1999).]]"},{"key":"e_1_3_2_1_35_1","volume-title":"United States Patent and Trademark Office","author":"WILFONG G. T.","year":"1997","unstructured":"WILFONG , G. T. Method and apparatus for secure PIN entry. US Patent #5,940,511 , United States Patent and Trademark Office , May 1997 . Assignee : Lucent Technologies, Inc. (Murray Hill, NJ).]] WILFONG, G. T. Method and apparatus for secure PIN entry. US Patent #5,940,511, United States Patent and Trademark Office, May 1997. Assignee: Lucent Technologies, Inc. (Murray Hill, NJ).]]"},{"key":"e_1_3_2_1_36_1","article-title":"Spain uncovers hi-tech cashpoint fraud","author":"WOOD D","year":"2003","unstructured":"WOOD , D . Spain uncovers hi-tech cashpoint fraud . BBC News Online , Jan. 2003 .]] WOOD, D. Spain uncovers hi-tech cashpoint fraud. BBC News Online, Jan. 2003.]]","journal-title":"BBC News Online"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/646280.687663"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2619314.2619638"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":37,"alternative-id":["10.1145\/1030083.1030116","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030116","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}