{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:00Z","timestamp":1750306200453,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":11,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1145\/3004107.3004121","type":"proceedings-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T12:29:21Z","timestamp":1477916961000},"page":"134-143","source":"Crossref","is-referenced-by-count":0,"title":["Experimental studies of a graphical authentication system based on semantic categorisation"],"prefix":"10.1145","author":[{"given":"Pascal","family":"Salembier","sequence":"first","affiliation":[]},{"given":"Moustafa","family":"Zouinar","sequence":"additional","affiliation":[]},{"given":"Robin","family":"H\u00e9ron","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Mathias","sequence":"additional","affiliation":[]},{"given":"Guirec","family":"Lorant","sequence":"additional","affiliation":[]},{"given":"Jean-Philippe","family":"Wary","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/3004107.3004121-1","doi-asserted-by":"crossref","unstructured":"Alt, F., Schneegass, S., Shirazi, A. S., Hassib, M. and Bulling, A. Graphical Passwords in the Wild --- Understanding How Users Choose Pictures and Passwords in Image-based Authentication Schemes. 2015. In Proceedings of the MobileHCI '15.. http:\/\/dx.doi.org\/10.1145\/2785830.2785882","DOI":"10.1145\/2785830.2785882"},{"key":"key-10.1145\/3004107.3004121-2","unstructured":"Biddle, R., Chiasson, S. and Oorschot, P. C. v. 2011.Graphical Passwords: Learning from the First Twelve Years.Technical Report TR-11-01, School of Computer Science, Carleton University."},{"key":"key-10.1145\/3004107.3004121-3","doi-asserted-by":"crossref","unstructured":"Chiang, H., and Chiasson, S. 2013. Improving user authentication on mobile devices: A Touchscreen Graphical Password.Proceedings of MobileHCI'13, (2013). http:\/\/dx.doi.org\/10.1145\/2493190.2493213","DOI":"10.1145\/2493190.2493213"},{"key":"key-10.1145\/3004107.3004121-4","doi-asserted-by":"crossref","unstructured":"Chowdhury, S., Poet, R., and Mackenzie, L. Passhint: Memorable and secure authentication. 2014. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI'14), 2917--2926. http:\/\/dx.doi.org\/10.1145\/2556288.2557153.","DOI":"10.1145\/2556288.2557153"},{"key":"key-10.1145\/3004107.3004121-5","unstructured":"Jermyn, I., Mayer, A. J., Monrose, F., Reiter, M. K. and Rubin, A. D. 1999.The Design and Analysis of Graphical Passwords.USENIX Security Symposium."},{"key":"key-10.1145\/3004107.3004121-6","unstructured":"Davis, D., Monrose, F. and Reiter, M. K. 2004. On User Choice in Graphical Password Schemes.13th USENIX Security Symposium."},{"key":"key-10.1145\/3004107.3004121-7","doi-asserted-by":"crossref","unstructured":"Motti, L. G., Vigouroux, N., &#38; Gorce, P. 2013. Interaction techniques for older adults using touchscreen devices: a literature reviewProceedings of the 25th Conference on l'Interaction Homme-Machine, pp. 125).","DOI":"10.1145\/2534903.2534920"},{"key":"key-10.1145\/3004107.3004121-8","unstructured":"Norman, D. A. THE WAY I SEE IT When security gets in the way. 2009.Interactions, 16, 6 : 60--63."},{"key":"key-10.1145\/3004107.3004121-9","unstructured":"Salembier, P., Zouinar, M., M., Mathias, C., Lorant, G., &#38; Wary, J.-P. 2015. Evaluation ergonomique d'un syst&#232;me d'authentification graphiqueActes de la conf&#233;rence EPIQUE 2015, Aix-en-Provence, 8--10 juillet: Arpege Publishing."},{"key":"key-10.1145\/3004107.3004121-10","doi-asserted-by":"crossref","unstructured":"Schaub, F., Walch, M., K&#246;nings, B., and Weber, M. 2013. Exploring the design space of graphical passwords on smartphones. InProceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS'13, 1--15.","DOI":"10.1145\/2501604.2501615"},{"key":"key-10.1145\/3004107.3004121-11","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A. and Memon, N. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system.International Journal of Human-Computer Studies, 63, 1:,102--127."}],"event":{"name":"Actes de la 28ieme conference francophone sur l'Interaction Homme-Machine","start":{"date-parts":[[2016,10,25]]},"number":"28","location":"Fribourg, Switzerland","end":{"date-parts":[[2016,10,28]]},"acronym":"IHM '16"},"container-title":["Actes de la 28i\u00e8me conf\u00e9rence francophone sur l'Interaction Homme-Machine on - IHM '16"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3004107.3004121","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3004121&amp;ftid=1807514&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:28Z","timestamp":1750218628000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3004107.3004121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1145\/3004107.3004121","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}