{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:18Z","timestamp":1750306578394,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["13JC1403500"],"award-info":[{"award-number":["13JC1403500"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61133014 61172085 61272536 61103221 61272037 and 61472249"],"award-info":[{"award-number":["61133014 61172085 61272536 61103221 61272037 and 61472249"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Program of Natural Science Foundation of Shaanxi Province","award":["2013JZ020"],"award-info":[{"award-number":["2013JZ020"]}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2013CB338004"],"award-info":[{"award-number":["2013CB338004"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2662379","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1460-1462","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Xiangxue","family":"Li","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, Shanghai, China"}]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, Shanghai, China"}]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"given":"Yuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Network Emergency Response Technical Team\/Coordination Center, Beijing, China"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-1-4471-0515-2_27"},{"unstructured":"Chinese characters. http:\/\/en.wikipedia.org\/wiki\/ Chinese_characters.  Chinese characters. http:\/\/en.wikipedia.org\/wiki\/ Chinese_characters.","key":"e_1_3_2_1_2_1"},{"unstructured":"Stroke count. http:\/\/en.wikipedia.org\/wiki\/Stroke_count_method.  Stroke count. http:\/\/en.wikipedia.org\/wiki\/Stroke_count_method.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"151","volume-title":"Proceedings of the 13th conference on USENIX Security Symposium, USENIX '04","author":"Davis Darren","year":"2004","unstructured":"Darren Davis , Fabian Monrose , and Michael K. Reiter . On user choice in graphical password schemes . In Proceedings of the 13th conference on USENIX Security Symposium, USENIX '04 , pages 151 -- 164 , 2004 . Darren Davis, Fabian Monrose, and Michael K. Reiter. On user choice in graphical password schemes. In Proceedings of the 13th conference on USENIX Security Symposium, USENIX '04, pages 151--164, 2004."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 9th conference on USENIX Security Symposium","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig . Deja vu : A user study using images for authentication . In Proceedings of the 9th conference on USENIX Security Symposium , 2000 . Rachna Dhamija and Adrian Perrig. Deja vu: A user study using images for authentication. In Proceedings of the 9th conference on USENIX Security Symposium, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-29035-0_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2508859.2512503"},{"key":"e_1_3_2_1_8_1","volume-title":"real user corporation, september","author":"Behind Passfaces The Science","year":"2001","unstructured":"The Science Behind Passfaces . Revision 2 , real user corporation, september 2001 . http:\/\/www.realuser.com\/ published\/ScienceBehindPassfaces.pdf. The Science Behind Passfaces. Revision 2, real user corporation, september 2001. http:\/\/www.realuser.com\/ published\/ScienceBehindPassfaces.pdf."},{"unstructured":"Pinyin. http:\/\/en.wikipedia.org\/wiki\/pinyin.  Pinyin. http:\/\/en.wikipedia.org\/wiki\/pinyin.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1002\/j.1538-7305.1951.tb01366.x"},{"unstructured":"Chinese text computing. http:\/\/lingua.mtsu.edu\/chinese -computing\/statistics\/index.html.  Chinese text computing. http:\/\/lingua.mtsu.edu\/chinese -computing\/statistics\/index.html.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"The entropy of the chinese and its application in the ontology research of the chinese, phd dissertation, shandong university","author":"Xu Xianpeng","year":"2013","unstructured":"Xianpeng Xu . The entropy of the chinese and its application in the ontology research of the chinese, phd dissertation, shandong university . 2013 . Xianpeng Xu. The entropy of the chinese and its application in the ontology research of the chinese, phd dissertation, shandong university. 2013."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS'14","name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2662379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2662379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:40Z","timestamp":1750227220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2662379"}},"subtitle":["Using Chinese Characters for Authentication--Algorithmic Framework and Empirical Results"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":12,"alternative-id":["10.1145\/2660267.2662379","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2662379","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}