{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:34:27Z","timestamp":1753522467777,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106488","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"252-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Sweet-spotting security and usability for intelligent graphical authentication mechanisms"],"prefix":"10.1145","author":[{"given":"Marios","family":"Belk","sequence":"first","affiliation":[{"name":"Cognitive UX GmbH, Heidelberg, Germany"}]},{"given":"Andreas","family":"Pamboris","sequence":"additional","affiliation":[{"name":"University of Central Lancashire and University of Cyprus, Nicosia, Cyprus"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Christina","family":"Katsini","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Nikolaos","family":"Avouris","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Workshop at the Symposium on USENIX Usable Privacy and Security (SOUPS","author":"Koved L.","year":"2016","unstructured":"L. Koved , and E. Stobert . 2016. Who are you?! Adventures in authentication (WAY) . Workshop at the Symposium on USENIX Usable Privacy and Security (SOUPS 2016 ). USENIX Assoc. L. Koved, and E. Stobert. 2016. Who are you?! Adventures in authentication (WAY). Workshop at the Symposium on USENIX Usable Privacy and Security (SOUPS 2016). USENIX Assoc."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"volume-title":"Proc. of the USENIX Security Symposium. USENIX Assoc.","author":"Dhamija R.","key":"e_1_3_2_1_3_1","unstructured":"R. Dhamija , and A. Perrig . 2000. DejaVu: A user study using images for authentication . In Proc. of the USENIX Security Symposium. USENIX Assoc. R. Dhamija, and A. Perrig. 2000. DejaVu: A user study using images for authentication. In Proc. of the USENIX Security Symposium. USENIX Assoc."},{"key":"e_1_3_2_1_4_1","unstructured":"Passfaces Corporation. 2009. The Science Behind Passfaces. Retrieved from www.passfaces.com\/enterprise\/resources\/white_papers.htm.  Passfaces Corporation. 2009. The Science Behind Passfaces. Retrieved from www.passfaces.com\/enterprise\/resources\/white_papers.htm."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493171.2493173"},{"key":"e_1_3_2_1_7_1","unstructured":"Tobii AB. 2017. Tobii Pro Glasses 2. Retrieved from htp:\/\/www.tobiipro.com\/product-listing\/tobii-pro-glasses-2\/#Specifications.  Tobii AB. 2017. Tobii Pro Glasses 2. Retrieved from htp:\/\/www.tobiipro.com\/product-listing\/tobii-pro-glasses-2\/#Specifications."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of USENIX SSYM","author":"Davis D.","year":"2004","unstructured":"D. Davis , F. Monrose , and M. Reiter . 2004. On user choice in graphical password schemes . In Proc. of USENIX SSYM 2004 . USENIX Assoc. D. Davis, F. Monrose, and M. Reiter. 2004. On user choice in graphical password schemes. In Proc. of USENIX SSYM 2004. USENIX Assoc."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1964.10490181"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(73)90032-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.2.5.523"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2166966.2167037"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732748"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470701"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501619"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the USENIX Security Symposium (Security","author":"Jermyn I.","year":"1999","unstructured":"I. Jermyn , A. Mayer , F. Monrose , M. Reiter , and A. Rubin . 1999. The design and analysis of graphical passwords . In Proc. of the USENIX Security Symposium (Security 1999 ). USENIX Assoc. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. 1999. The design and analysis of graphical passwords. In Proc. of the USENIX Security Symposium (Security 1999). USENIX Assoc."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.19"},{"key":"e_1_3_2_1_20_1","first-page":"273","article-title":"Pass-Go: A proposal to improve the usability of graphical passwords","volume":"7","author":"Tao H.","year":"2008","unstructured":"H. Tao , and C. Adams . 2008 . Pass-Go: A proposal to improve the usability of graphical passwords . Network Security 7 , 2 (2008), 273 -- 292 . H. Tao, and C. Adams. 2008. Pass-Go: A proposal to improve the usability of graphical passwords. Network Security 7, 2 (2008), 273--292.","journal-title":"Network Security"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1531514.1531531"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_27"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2429004"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053217"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"M. Belk C. Fidas P. Germanakos and G. Samaras. 2017. The interplay between humans technology and user authentication: a cognitive processing perspective. Computers in Human Behavior. (to appear).  M. Belk C. Fidas P. Germanakos and G. Samaras. 2017. The interplay between humans technology and user authentication: a cognitive processing perspective. Computers in Human Behavior. (to appear).","DOI":"10.1016\/j.chb.2017.06.042"}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"],"location":"Leipzig Germany","acronym":"WI '17"},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:13Z","timestamp":1750217413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":26,"alternative-id":["10.1145\/3106426.3106488","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106488","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}