{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:17Z","timestamp":1750306577988,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2013CB338004"],"award-info":[{"award-number":["2013CB338004"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["13JC1403500"],"award-info":[{"award-number":["13JC1403500"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Program of Natural Science Foundation of Shaanxi Province","award":["2013JZ020"],"award-info":[{"award-number":["2013JZ020"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472249 61172085 61272536 61103221 61272037 and 61133014"],"award-info":[{"award-number":["61472249 61172085 61272536 61103221 61272037 and 61133014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2662368","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1457-1459","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Xiangxue","family":"Li","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, Shanghai, China"}]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, Shanghai, China"}]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Network Emergency Response Technical Team\/Coordination Center, Beijing, China"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"unstructured":"7k7k Game. http:\/\/www.7k7k.com\/.  7k7k Game. http:\/\/www.7k7k.com\/.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Proceedings of the 4th USENIX conference on Offensive technologies, WOOT'10","author":"Aviv Adam J.","unstructured":"Adam J. Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M. Smith . Smudge attacks on smartphone touch screens . In Proceedings of the 4th USENIX conference on Offensive technologies, WOOT'10 , pages 1 -- ACM, 2010. Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX conference on Offensive technologies, WOOT'10, pages 1-- ACM, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"Study of present probability of 26 english letter s in chinese characters spelling yard. Computer Engineering and Applications}, 07:146--151","author":"Chunsheng Zhang","year":"2006","unstructured":"Zhang Chunsheng and Guan Weiwei . Study of present probability of 26 english letter s in chinese characters spelling yard. Computer Engineering and Applications}, 07:146--151 , 2006 . Zhang Chunsheng and Guan Weiwei. Study of present probability of 26 english letter s in chinese characters spelling yard. Computer Engineering and Applications}, 07:146--151, 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/www.cert.org.cn\/publish\/main\/11\/2012\/2012 0330183913861664205\/20120330183913861664205_.html","author":"CNCERT.","year":"2011","unstructured":"CNCERT. http:\/\/www.cert.org.cn\/publish\/main\/11\/2012\/2012 0330183913861664205\/20120330183913861664205_.html . 2011 . CNCERT. http:\/\/www.cert.org.cn\/publish\/main\/11\/2012\/2012 0330183913861664205\/20120330183913861664205_.html. 2011."},{"unstructured":"Cryptography. http:\/\/cga.qidian.com\/bookreader\/vol 1049641 2195185.aspx.  Cryptography. http:\/\/cga.qidian.com\/bookreader\/vol 1049641 2195185.aspx.","key":"e_1_3_2_1_5_1"},{"unstructured":"17173 Game. http:\/\/www.17173.com\/.  17173 Game. http:\/\/www.17173.com\/.","key":"e_1_3_2_1_6_1"},{"unstructured":"Mohit Kumar. China software developer network (csdn) 6 million user data leaked. http:\/\/thehackernews.com\/2011\/12\/ china-software-developer-network-csdn-6.html  Mohit Kumar. China software developer network (csdn) 6 million user data leaked. http:\/\/thehackernews.com\/2011\/12\/ china-software-developer-network-csdn-6.html","key":"e_1_3_2_1_7_1"},{"unstructured":"Richard Lai. Touchscreen smudge may give away your android password pattern http:\/\/www.engadget.com\/2010\/08\/ 16\/shocker-touchscreen-smudge-may-give-away-your-android-password\/.  Richard Lai. Touchscreen smudge may give away your android password pattern http:\/\/www.engadget.com\/2010\/08\/ 16\/shocker-touchscreen-smudge-may-give-away-your-android-password\/.","key":"e_1_3_2_1_8_1"},{"unstructured":"The Chinese Software Developer Network (CSDN). http:\/\/en. wikipedia.org\/wiki\/CSDN.  The Chinese Software Developer Network (CSDN). http:\/\/en. wikipedia.org\/wiki\/CSDN.","key":"e_1_3_2_1_9_1"},{"unstructured":"Schneier on Security. Information leakage from keypads. https:\/\/www.schneier.com\/blog\/archives\/2009\/07\/information_lea_1.html.  Schneier on Security. Information leakage from keypads. https:\/\/www.schneier.com\/blog\/archives\/2009\/07\/information_lea_1.html.","key":"e_1_3_2_1_10_1"},{"unstructured":"Pinyin. http:\/\/en.wikipedia.org\/wiki\/pinyin.  Pinyin. http:\/\/en.wikipedia.org\/wiki\/pinyin.","key":"e_1_3_2_1_11_1"},{"unstructured":"Site ranking for Tianya Club (tianya.cn) by Alexa. http:\/\/www.alexa.com\/siteinfo\/tianya.cn.  Site ranking for Tianya Club (tianya.cn) by Alexa. http:\/\/www.alexa.com\/siteinfo\/tianya.cn.","key":"e_1_3_2_1_12_1"},{"unstructured":"Zhenai. http:\/\/www.zhenai.com\/.  Zhenai. http:\/\/www.zhenai.com\/.","key":"e_1_3_2_1_13_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS'14","name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2662368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2662368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:40Z","timestamp":1750227220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2662368"}},"subtitle":["Arranging the Layout of Alphanumeric Buttons--the Role of Passwords"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":13,"alternative-id":["10.1145\/2660267.2662368","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2662368","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}