{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:38Z","timestamp":1774946558398,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T00:00:00Z","timestamp":1350864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,22]]},"DOI":"10.1145\/2384916.2384945","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:07:05Z","timestamp":1350907625000},"page":"159-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":88,"title":["PassChords"],"prefix":"10.1145","author":[{"given":"Shiri","family":"Azenkot","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Kyle","family":"Rector","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Richard","family":"Ladner","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Jacob","family":"Wobbrock","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28073-3_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. GI'12","author":"Azenkot S.","year":"2012","unstructured":"S. Azenkot , J. O. Wobbrock , S. Prasain , and R. E. Ladner . Input finger detection for nonvisual touch screen text entry in perkinput . In Proc. GI'12 , New York, NY, USA , 2012 . ACM. S. Azenkot, J. O. Wobbrock, S. Prasain, and R. E. Ladner. Input finger detection for nonvisual touch screen text entry in perkinput. In Proc. GI'12, New York, NY, USA, 2012. ACM."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037442"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518983"},{"key":"e_1_3_2_1_7_1","volume-title":"Perfect passwords","author":"Burnett M.","year":"2006","unstructured":"M. Burnett . Perfect passwords . Syngress Publishing , Rockland, Massachusetts , 2006 . M. Burnett. Perfect passwords. Syngress Publishing, Rockland, Massachusetts, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"NIST Special Publication","author":"Burr W. E.","year":"2004","unstructured":"W. E. Burr , D. F. Dodson , W. T. Polk , and D. L. Evans . Electronic authentication guideline . In NIST Special Publication , 2004 . W. E. Burr, D. F. Dodson, W. T. Polk, and D. L. Evans. Electronic authentication guideline. In NIST Special Publication, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"e_1_3_2_1_10_1","first-page":"45","volume-title":"Proc. USENIX Security Symposium","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . Deja vu: A user study using images for authentication . In Proc. USENIX Security Symposium , pages 45 -- 58 , Berkeley, CA, USA , 2000 . USENIX Association. R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In Proc. USENIX Security Symposium, pages 45--58, Berkeley, CA, USA, 2000. USENIX Association."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296843.1296894"},{"key":"e_1_3_2_1_13_1","volume-title":"Why mobile security is not like traditional security","author":"Jakobsson M.","year":"2011","unstructured":"M. Jakobsson . Why mobile security is not like traditional security , 2011 . http:\/\/www.markusjakobsson. com\/wp-content\/uploads\/fc11jakobsson.pdf. M. Jakobsson. Why mobile security is not like traditional security, 2011. http:\/\/www.markusjakobsson. com\/wp-content\/uploads\/fc11jakobsson.pdf."},{"key":"e_1_3_2_1_14_1","first-page":"9","volume-title":"Proc. HotSec'09","author":"Jakobsson M.","year":"2009","unstructured":"M. Jakobsson , E. Shi , P. Golle , and R. Chow . Implicit authentication for mobile devices . In Proc. HotSec'09 , pages 9 -- 9 , Berkeley, CA, USA , 2009 . USENIX Association. M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit authentication for mobile devices. In Proc. HotSec'09, pages 9--9, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-124","volume-title":"Guidelines on cell phone and pda security recommendations of the national","author":"Jansen W.","year":"2008","unstructured":"W. Jansen , K. Scarfone , C. M. Gutierrez , D. Patrick , D. Gallagher , and D. Director . Guidelines on cell phone and pda security recommendations of the national , 2008 . W. Jansen, K. Scarfone, C. M. Gutierrez, D. Patrick, D. Gallagher, and D. Director. Guidelines on cell phone and pda security recommendations of the national, 2008."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Proc SSYM'99","author":"Jermyn I.","year":"1999","unstructured":"I. Jermyn , A. Mayer , F. Monrose , M. K. Reiter , and A. D. Rubin . The design and analysis of graphical passwords . In Proc SSYM'99 , pages 1 -- 1 , Berkeley, CA, USA , 1999 . USENIX Association. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In Proc SSYM'99, pages 1--1, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639642.1639663"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358810"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878875"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047231"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284685"},{"key":"e_1_3_2_1_22_1","volume-title":"Mitnick to lawmakers: People, phones and weakest links","author":"Poulsen K.","year":"2009","unstructured":"K. Poulsen . Mitnick to lawmakers: People, phones and weakest links , 2009 . http:\/\/www.politechbot.com\/p-00969.html. K. Poulsen. Mitnick to lawmakers: People, phones and weakest links, 2009. http:\/\/www.politechbot.com\/p-00969.html."},{"key":"e_1_3_2_1_23_1","volume-title":"The Guardian, 2009","author":"Schneier B.","year":"2009","unstructured":"B. Schneier . The secret question is: why do IT systems use insecure passwords ? The Guardian, 2009 . http:\/\/www.guardian.co.uk\/technology\/ 2009 \/feb\/19\/insecurepasswords-conickerb-worm. B. Schneier. The secret question is: why do IT systems use insecure passwords? The Guardian, 2009. http:\/\/www.guardian.co.uk\/technology\/2009\/feb\/19\/insecurepasswords-conickerb-worm."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046704"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622194"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495927"}],"event":{"name":"ASSETS '12: The 14th International ACM SIGACCESS Conference on Computers and Accessibility","location":"Boulder Colorado USA","acronym":"ASSETS '12","sponsor":["SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384916.2384945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2384916.2384945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:25Z","timestamp":1750239265000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384916.2384945"}},"subtitle":["secure multi-touch authentication for blind people"],"short-title":[],"issued":{"date-parts":[[2012,10,22]]},"references-count":29,"alternative-id":["10.1145\/2384916.2384945","10.1145\/2384916"],"URL":"https:\/\/doi.org\/10.1145\/2384916.2384945","relation":{},"subject":[],"published":{"date-parts":[[2012,10,22]]},"assertion":[{"value":"2012-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}