{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:18:49Z","timestamp":1776104329263,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078835","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Shoulder surfing defence for recall-based graphical passwords"],"prefix":"10.1145","author":[{"given":"Nur Haryani","family":"Zakaria","sequence":"first","affiliation":[{"name":"Newcastle University, UK"}]},{"given":"David","family":"Griffiths","sequence":"additional","affiliation":[{"name":"Newcastle University, UK"}]},{"given":"Sacha","family":"Brostoff","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Jeff","family":"Yan","sequence":"additional","affiliation":[{"name":"Newcastle University, UK and Chinese University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_3_2_1_2_1","volume-title":"Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys, to appear.","author":"Biddle R.","year":"2011","unstructured":"R. Biddle , S. Chiasson , and P. C. V. Oorschot . 2011 . Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys, to appear. R. Biddle, S. Chiasson, and P. C. V. Oorschot. 2011. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys, to appear."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324932"},{"key":"e_1_3_2_1_5_1","first-page":"4","volume-title":"Proc. of the 9th USENIX Security Symposium","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . 2000. Deja Vu: A User Study Using Images for Authentication . In Proc. of the 9th USENIX Security Symposium ( Denver, Colorado, USA, August 14--17 , 2000 ). pp 4 -- 19 . R. Dhamija and A. Perrig. 2000. Deja Vu: A User Study Using Images for Authentication. In Proc. of the 9th USENIX Security Symposium (Denver, Colorado, USA, August 14--17, 2000). pp 4--19."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506639"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.13"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of The 8th USENIX Security Symposium","author":"Jermyn I.","year":"1999","unstructured":"I. Jermyn , A. Mayer , F. Monrose , M. K. Reiter , and A. D. Rubin . 1999. The Design and Analysis of Graphical Passwords . In Proceedings of The 8th USENIX Security Symposium ( Washington, DC, August 23--26 , 1999 ) IEEE Computer Society, 1--14. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. 1999. The Design and Analysis of Graphical Passwords. In Proceedings of The 8th USENIX Security Symposium (Washington, DC, August 23--26, 1999) IEEE Computer Society, 1--14."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_13_1","first-page":"136","article-title":"When 100% Really Isn't 100%: Improving the Accuracy of Small-Sample Estimates of Completion Rates","volume":"3","author":"Sauro J. R.","year":"2006","unstructured":"Lewis, J. R. , & Sauro , J. 2006 . When 100% Really Isn't 100%: Improving the Accuracy of Small-Sample Estimates of Completion Rates . Journal of Usability Studies , 3 , 1 (2006), 136 -- 150 . Lewis, J. R., & Sauro, J. 2006. When 100% Really Isn't 100%: Improving the Accuracy of Small-Sample Estimates of Completion Rates. Journal of Usability Studies, 3, 1 (2006), 136--150.","journal-title":"Journal of Usability Studies"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo","author":"Li Z.","year":"2005","unstructured":"Z. Li , Q. Sun , Y. Lian , and D. D. Guisto . 2005. An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack . In Proceedings of the IEEE International Conference on Multimedia and Expo ( Amsterdam, The Netherlands, July 6--8 , 2005 ) IEEE Computer Society, 245--248. Z. Li, Q. Sun, Y. Lian, and D. D. Guisto. 2005. An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack. In Proceedings of the IEEE International Conference on Multimedia and Expo (Amsterdam, The Netherlands, July 6--8, 2005) IEEE Computer Society, 245--248."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280708"},{"key":"e_1_3_2_1_16_1","unstructured":"Amzer Privacy Protector Shield for HTC Magic. http:\/\/www.cellsavers.co.uk\/acatalog\/Privacy_Screen-Protectors.html. Accessed on February 14 2011.  Amzer Privacy Protector Shield for HTC Magic. http:\/\/www.cellsavers.co.uk\/acatalog\/Privacy_Screen-Protectors.html. Accessed on February 14 2011."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceeding EuroHaptics (Paris, France, July 3--6","author":"Malek B.","year":"2006","unstructured":"B. Malek , M. Orozco , and A. El Saddik . 2006. Novel Shoulder Surfing Resistant Haptic-based Graphical Password . In Proceeding EuroHaptics (Paris, France, July 3--6 , 2006 ). B. Malek, M. Orozco, and A. El Saddik. 2006. Novel Shoulder Surfing Resistant Haptic-based Graphical Password. In Proceeding EuroHaptics (Paris, France, July 3--6, 2006)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the International Conference on Security and Management","author":"Man S.","year":"2003","unstructured":"S. Man , D. Hong , and M. Matthews . 2003. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW . In Proceedings of the International Conference on Security and Management ( Las Vegas, Nevada, US, June 23--26 , 2003 ). CSREA Press, 105--111. S. Man, D. Hong, and M. Matthews. 2003. A Shoulder-Surfing Resistant Graphical Password Scheme - WIW. In Proceedings of the International Conference on Security and Management (Las Vegas, Nevada, US, June 23--26, 2003). CSREA Press, 105--111."},{"key":"e_1_3_2_1_19_1","volume-title":"Two Factor Authentication for the Enterprise","author":"Real User Corporation","year":"2005","unstructured":"Real User Corporation , Passfaces : Two Factor Authentication for the Enterprise , 2005 . Real User Corporation, Passfaces: Two Factor Authentication for the Enterprise, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_21_1","volume-title":"The Rutgers Scholar","author":"Sobrado L.","year":"2002","unstructured":"L. Sobrado and J. C. Birget . 2002 . Graphical passwords. vol. 4 : The Rutgers Scholar , 2002. L. Sobrado and J. C. Birget. 2002. Graphical passwords. vol. 4: The Rutgers Scholar, 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_1_24_1","article-title":"Pass-Go: A Proposal to Improve the Usability of Graphical Passwords","volume":"7","author":"Tao H.","year":"2008","unstructured":"H. Tao and C. Adams . 2008 . Pass-Go: A Proposal to Improve the Usability of Graphical Passwords . Int'l Journal of Network Security , 7 , 2008, 273--292. H. Tao and C. Adams. 2008. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. Int'l Journal of Network Security, 7, 2008, 273--292.","journal-title":"Int'l Journal of Network Security"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.44"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251385"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.10"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":29,"alternative-id":["10.1145\/2078827.2078835","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078835","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}