{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:24Z","timestamp":1775067024911,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T00:00:00Z","timestamp":1353888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,11,26]]},"DOI":"10.1145\/2414536.2414584","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"285-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["WYSWYE"],"prefix":"10.1145","author":[{"given":"Rohit Ashok","family":"Khot","sequence":"first","affiliation":[{"name":"IIIT-Delhi, Delhi, India"}]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[{"name":"IIIT-Delhi, Delhi, India"}]},{"given":"Kannan","family":"Srinathan","sequence":"additional","affiliation":[{"name":"IIIT-Hyderabad, Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2012,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754029"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. WEIS","author":"Bonneau J.","year":"2010","unstructured":"Bonneau , J. , and Preibusch , S . The password thicket: technical and market failures in human authentication on the web , In Proc. WEIS 2010 . Bonneau, J., and Preibusch, S. The password thicket: technical and market failures in human authentication on the web, In Proc. WEIS 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2146303.2146317"},{"key":"e_1_3_2_1_5_1","volume-title":"Security and Usability: Designing Systems that People can use. O'reilly","author":"Cranor L.","year":"2005","unstructured":"Cranor , L. , and Garfinkel , S . Security and Usability: Designing Systems that People can use. O'reilly , 2005 . Cranor, L., and Garfinkel, S. Security and Usability: Designing Systems that People can use. O'reilly, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753490"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324932"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518840"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. COGAIN '08","author":"Dunphy P.","unstructured":"Dunphy , P. , Fitch , A. , and Olivier , P . Gaze Contingent graphical passwords at the ATM . In Proc. COGAIN '08 . Dunphy, P., Fitch, A., and Olivier, P. Gaze Contingent graphical passwords at the ATM. In Proc. COGAIN '08."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753491"},{"key":"e_1_3_2_1_13_1","unstructured":"Gridsure. http:\/\/www.gridsure.com.  Gridsure. http:\/\/www.gridsure.com."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. HotSec","author":"Jakobsson M.","year":"2009","unstructured":"Jakobsson , M. , Shi , E. , and Chow , R . Implicit authentication for mobile devices , In Proc. HotSec 2009 . Jakobsson, M., Shi, E., and Chow, R. Implicit authentication for mobile devices, In Proc. HotSec 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. USENIX Security","author":"Jermyn I.","year":"1999","unstructured":"Jermyn , I. , Mayer , A. , Monrose , F. , Reiter , M. K. , and Rubin , A. D . The design and analysis of graphical passwords . In Proc. USENIX Security , 1999 . Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., and Rubin, A. D. The design and analysis of graphical passwords. In Proc. USENIX Security, 1999."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979322"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280708"},{"key":"e_1_3_2_1_20_1","volume-title":"A. Novel Shoulder Surfing Resistant Haptic-based Graphical Password. In Proc. EuroHaptics","author":"Malek B.","year":"2006","unstructured":"Malek , B. , Orozco , M. , and El Saddik , A. Novel Shoulder Surfing Resistant Haptic-based Graphical Password. In Proc. EuroHaptics 2006 , 3--6. Malek, B., Orozco, M., and El Saddik, A. Novel Shoulder Surfing Resistant Haptic-based Graphical Password. In Proc. EuroHaptics 2006, 3--6."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. Security and Management","author":"Man S.","year":"2003","unstructured":"Man , S. , Hong , D. , and Matthews , M . A Shoulder-Surfing Resistant Graphical Password Scheme . In Proc. Security and Management 2003 , CSREA, 105--111. Man, S., Hong, D., and Matthews, M. A Shoulder-Surfing Resistant Graphical Password Scheme. In Proc. Security and Management 2003, CSREA, 105--111."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837116"},{"key":"e_1_3_2_1_24_1","volume-title":"Two Factor Authentication for the Enterprise","author":"Real User Corporation","year":"2005","unstructured":"Real User Corporation , Passfaces : Two Factor Authentication for the Enterprise , 2005 . Real User Corporation, Passfaces: Two Factor Authentication for the Enterprise, 2005."},{"key":"e_1_3_2_1_25_1","unstructured":"RSA SecureID http:\/\/www.rsa.com\/node.aspx?id=1156.  RSA SecureID http:\/\/www.rsa.com\/node.aspx?id=1156."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357085"},{"key":"e_1_3_2_1_28_1","volume-title":"The Rutgers Scholar","author":"Sobrado L.","year":"2002","unstructured":"Sobrado , L. , and Birget , J. C . Graphical passwords . vol. 4 : The Rutgers Scholar , 2002 . Sobrado, L., and Birget, J. C. Graphical passwords. vol. 4: The Rutgers Scholar, 2002."},{"key":"e_1_3_2_1_29_1","volume-title":"A Design and Analysis of Graphical Password. M. S. thesis","author":"Suo X.","unstructured":"Suo , X. 2006. A Design and Analysis of Graphical Password. M. S. thesis , College of Arts and Sciences, Georgia State University . Suo, X. 2006. A Design and Analysis of Graphical Password. M. S. thesis, College of Arts and Sciences, Georgia State University."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. OZCHI","author":"Tan D.","year":"2005","unstructured":"Tan , D. , Keyani , P. , Czerwinski , M. Spy-resistant keyboard: more secure password entry on public touch screen displays . In Proc. OZCHI 2005 . Tan, D., Keyani, P., Czerwinski, M. Spy-resistant keyboard: more secure password entry on public touch screen displays. In Proc. OZCHI 2005."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979945"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"}],"event":{"name":"OzCHI '12: The 24th Australian Computer-Human Interaction Conference","location":"Melbourne Australia","acronym":"OzCHI '12","sponsor":["New Zealand Chapter of ACM SIGCHI","Human Factors & Ergonomics Soc Human Factors & Ergonomics Soc","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 24th Australian Computer-Human Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2414536.2414584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2414536.2414584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:16Z","timestamp":1750235716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2414536.2414584"}},"subtitle":["shoulder surfing defense for recognition based graphical passwords"],"short-title":[],"issued":{"date-parts":[[2012,11,26]]},"references-count":35,"alternative-id":["10.1145\/2414536.2414584","10.1145\/2414536"],"URL":"https:\/\/doi.org\/10.1145\/2414536.2414584","relation":{},"subject":[],"published":{"date-parts":[[2012,11,26]]},"assertion":[{"value":"2012-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}