{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:16:35Z","timestamp":1774196195208,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:00:00Z","timestamp":1354579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,4]]},"DOI":"10.1145\/2406367.2406384","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T20:10:58Z","timestamp":1354651858000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":124,"title":["Password entry usability and shoulder surfing susceptibility on different smartphone platforms"],"prefix":"10.1145","author":[{"given":"Florian","family":"Schaub","sequence":"first","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Ruben","family":"Deyhle","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Michael","family":"Weber","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,12,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358926"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2116781"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_2_4_1","volume-title":"WEIS'10","author":"Bonneau J.","year":"2010","unstructured":"J. Bonneau and S. Preibusch . The password thicket: technical and market failures in human authentication on the web . In WEIS'10 , 2010 . J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. In WEIS'10, 2010."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408666"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_3_2_2_9_1","volume-title":"USENIX Security Symp.","author":"Jermyn I.","year":"1999","unstructured":"I. Jermyn , A. Mayer , F. Monrose , M. K. Reiter , and A. D. Rubin . The design and analysis of graphical passwords . In USENIX Security Symp. , 1999 . I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In USENIX Security Symp., 1999."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.28"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.005"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518750"},{"issue":"8","key":"e_1_3_2_2_17_1","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"Levenshtein V. I.","year":"1966","unstructured":"V. I. Levenshtein . Binary codes capable of correcting deletions, insertions and reversals . Soviet Physics Doklady , 10 ( 8 ): 707 -- 710 , 1966 . V. I. Levenshtein. Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady, 10(8):707--710, 1966.","journal-title":"Soviet Physics Doklady"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447319509526110"},{"issue":"3","key":"e_1_3_2_2_19_1","article-title":"Psychometric evaluation of the PSSUQ using data from five years of usability studies","volume":"14","author":"Lewis J. R.","year":"2002","unstructured":"J. R. Lewis . Psychometric evaluation of the PSSUQ using data from five years of usability studies . Intl. J. Hum.-Comp. Int. , 14 ( 3 ), 2002 . J. R. Lewis. Psychometric evaluation of the PSSUQ using data from five years of usability studies. Intl. J. Hum.-Comp. Int., 14(3), 2002.","journal-title":"Intl. J. Hum.-Comp. Int."},{"key":"e_1_3_2_2_20_1","volume-title":"Design of a Multi-Touch Shoulder Surfing Resilient Graphical Password. Dissertation","author":"Nicholson J.","year":"2009","unstructured":"J. Nicholson . Design of a Multi-Touch Shoulder Surfing Resilient Graphical Password. Dissertation , Newcastle University , 2009 . J. Nicholson. Design of a Multi-Touch Shoulder Surfing Resilient Graphical Password. Dissertation, Newcastle University, 2009."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409240.1409304"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357085"},{"key":"e_1_3_2_2_24_1","volume-title":"OZCHI '05","author":"Tan D. S.","year":"2005","unstructured":"D. S. Tan , P. Keyani , and M. Czerwinski . Spy-resistant keyboard: more secure password entry on public touch screen displays . In OZCHI '05 , 2005 . D. S. Tan, P. Keyani, and M. Czerwinski. Spy-resistant keyboard: more secure password entry on public touch screen displays. In OZCHI '05, 2005."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.317"}],"event":{"name":"MUM '12: 11th International Conference on Mobile and Ubiquitous Multimedia","location":"Ulm Germany","acronym":"MUM '12","sponsor":["University of Duisburg-Essen","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2406367.2406384","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2406367.2406384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:30Z","timestamp":1750235730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2406367.2406384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,4]]},"references-count":28,"alternative-id":["10.1145\/2406367.2406384","10.1145\/2406367"],"URL":"https:\/\/doi.org\/10.1145\/2406367.2406384","relation":{},"subject":[],"published":{"date-parts":[[2012,12,4]]},"assertion":[{"value":"2012-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}