{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:22Z","timestamp":1750221142168,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"General Secretariat for Research and Technology (GSRT) and Hellenic Foundation for Research and Innovation (HFRI)","award":["617"],"award-info":[{"award-number":["617"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3206505.3206546","type":"proceedings-article","created":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T12:05:37Z","timestamp":1526990737000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Does image grid visualization affect password strength and creation time in graphical authentication?"],"prefix":"10.1145","author":[{"given":"Christina","family":"Katsini","sequence":"first","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"George E.","family":"Raptis","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Nikolaos","family":"Avouris","sequence":"additional","affiliation":[{"name":"University of Patras Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106488"},{"volume-title":"People and Computers XIV --- Usability or Else!","author":"Brostoff Sacha","key":"e_1_3_2_1_3_1","unstructured":"Sacha Brostoff and M. Angela Sasse . 2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation . In People and Computers XIV --- Usability or Else! , Sharon McDonald, Yvonne Waern, and Gilbert Cockton (Eds.). Springer London , London , 405--424. Sacha Brostoff and M. Angela Sasse. 2000. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In People and Computers XIV --- Usability or Else!, Sharon McDonald, Yvonne Waern, and Gilbert Cockton (Eds.). Springer London, London, 405--424."},{"key":"e_1_3_2_1_4_1","volume-title":"Human-Computer Interaction - INTERACT","author":"Chowdhury Soumyadeb","year":"2013","unstructured":"Soumyadeb Chowdhury , Ron Poet , and Lewis Mackenzie . 2013. A Comprehensive Study of the Usability of Multiple Graphical Passwords . In Human-Computer Interaction - INTERACT 2013 , Paula Kotz\u00e9, Gary Marsden , Gitte Lindgaard, Janet Wesson, and Marco Winckler (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 424--441. Soumyadeb Chowdhury, Ron Poet, and Lewis Mackenzie. 2013. A Comprehensive Study of the Usability of Multiple Graphical Passwords. In Human-Computer Interaction - INTERACT 2013, Paula Kotz\u00e9, Gary Marsden, Gitte Lindgaard, Janet Wesson, and Marco Winckler (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 424--441."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium","volume":"9","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig . 2000 . Deja Vu-A User Study: Using Images for Authentication .. In USENIX Security Symposium , Vol. 9 . 4--4. Rachna Dhamija and Adrian Perrig. 2000. Deja Vu-A User Study: Using Images for Authentication.. In USENIX Security Symposium, Vol. 9. 4--4."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003733.3003764"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053217"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172996"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204493.3204589"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858384"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1220103"},{"key":"e_1_3_2_1_16_1","volume-title":"ImagePass - Designing Graphical Authentication for Security. In 7th International Conference on Next Generation Web Services Practices. 262--267","author":"Mihajlov Martin","year":"2011","unstructured":"Martin Mihajlov , Borka Jerman-Bla\u017ei\u010d , and Marko Ilievski . 2011 . ImagePass - Designing Graphical Authentication for Security. In 7th International Conference on Next Generation Web Services Practices. 262--267 . Martin Mihajlov, Borka Jerman-Bla\u017ei\u010d, and Marko Ilievski. 2011. ImagePass - Designing Graphical Authentication for Security. In 7th International Conference on Next Generation Web Services Practices. 262--267."},{"key":"e_1_3_2_1_17_1","volume-title":"International Journal of Human-Computer Studies","author":"Raptis George E.","year":"2018","unstructured":"George E. Raptis , Christos Fidas , and Nikolaos Avouris . 2018. Effects of Mixed-Reality on Players' Behaviour and Immersion in a Cultural Tourism Game: A Cognitive Processing Perspective . International Journal of Human-Computer Studies ( 2018 ). George E. Raptis, Christos Fidas, and Nikolaos Avouris. 2018. Effects of Mixed-Reality on Players' Behaviour and Immersion in a Cultural Tourism Game: A Cognitive Processing Perspective. International Journal of Human-Computer Studies (2018)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02804"},{"volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07)","author":"Thorpe Julie","key":"e_1_3_2_1_20_1","unstructured":"Julie Thorpe and Paul C . van Oorschot. 2007. Human-seeded Attacks and Exploiting Hot-spots in Graphical Passwords . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07) . USENIX Association, Berkeley, CA, USA, Article 8, 16 pages. http:\/\/dl.acm.org\/citation.cfm?id=1362903.1362911 Julie Thorpe and Paul C. van Oorschot. 2007. Human-seeded Attacks and Exploiting Hot-spots in Graphical Passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07). USENIX Association, Berkeley, CA, USA, Article 8, 16 pages. http:\/\/dl.acm.org\/citation.cfm?id=1362903.1362911"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"}],"event":{"name":"AVI '18: 2018 International Conference on Advanced Visual Interfaces","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Castiglione della Pescaia Grosseto Italy","acronym":"AVI '18"},"container-title":["Proceedings of the 2018 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206505.3206546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206505.3206546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:10Z","timestamp":1750208890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206505.3206546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":22,"alternative-id":["10.1145\/3206505.3206546","10.1145\/3206505"],"URL":"https:\/\/doi.org\/10.1145\/3206505.3206546","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}