{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:58Z","timestamp":1750307758837,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,28]],"date-time":"2007-11-28T00:00:00Z","timestamp":1196208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,28]]},"DOI":"10.1145\/1324892.1324943","type":"proceedings-article","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T18:13:30Z","timestamp":1199384010000},"page":"239-240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["PassShape"],"prefix":"10.1145","author":[{"given":"Alexander","family":"De Luca","sequence":"first","affiliation":[{"name":"Media Informatics Group, Munich, Germany"}]},{"given":"Roman","family":"Weiss","sequence":"additional","affiliation":[{"name":"Media Informatics Group, Munich, Germany"}]},{"given":"Heinrich","family":"Hussmann","sequence":"additional","affiliation":[{"name":"Media Informatics Group, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2007,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324932"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1778331.1778385"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Jermyn I.","year":"1999","unstructured":"Jermyn , I. , Mayer A. , Monrose , F. , Reiter , M. , and Rubin ., A. 1999 . The design and analysis of graphical passwords . In: Proceedings of USENIX Security Symposium , August 1999. Jermyn, I., Mayer A., Monrose, F., Reiter, M., and Rubin., A. 1999. The design and analysis of graphical passwords. In: Proceedings of USENIX Security Symposium, August 1999."},{"key":"e_1_3_2_1_5_1","volume-title":"Financial Services Technology","author":"Rogers J.","year":"2007","unstructured":"Rogers , J. 2007. \" Please enter your 4-digit PIN\". In Financial Services Technology , U.S. Edition , Issue 4, March 2007 . Rogers, J. 2007. \"Please enter your 4-digit PIN\". In Financial Services Technology, U.S. Edition, Issue 4, March 2007."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of OZCHI'05","author":"Tan D. S.","year":"2005","unstructured":"Tan , D. S. , Keyani , P. , and Czerwinski , M . 2005. Spy-resistant keyboard: more secure password entry on public touch screen displays . In: Proceedings of OZCHI'05 , Canberra, Australia, November 21 -- 25 , 2005 . Tan, D. S., Keyani, P., and Czerwinski, M. 2005. Spy-resistant keyboard: more secure password entry on public touch screen displays. In: Proceedings of OZCHI'05, Canberra, Australia, November 21 -- 25, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"}],"event":{"name":"OZCHI '07: Proceedings of the 19th conference of the computer-human interaction special interest group of Australia on Computer-human interaction: design","sponsor":["TechSmith","The Hiser Group","DSTO The Defence Science and Technology Organisation","Tobii","Objective Digital"],"location":"Adelaide Australia","acronym":"OZCHI '07"},"container-title":["Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1324892.1324943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1324892.1324943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:27Z","timestamp":1750253967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1324892.1324943"}},"subtitle":["stroke based shape passwords"],"short-title":[],"issued":{"date-parts":[[2007,11,28]]},"references-count":8,"alternative-id":["10.1145\/1324892.1324943","10.1145\/1324892"],"URL":"https:\/\/doi.org\/10.1145\/1324892.1324943","relation":{},"subject":[],"published":{"date-parts":[[2007,11,28]]},"assertion":[{"value":"2007-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}