{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:33Z","timestamp":1750220913506,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1209280 and CNS-1526524"],"award-info":[{"award-number":["CNS-1209280 and CNS-1526524"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Google Faculty Research Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359838","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"355-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Challenge-response behavioral mobile authentication"],"prefix":"10.1145","author":[{"given":"Manar","family":"Mohamed","sequence":"first","affiliation":[{"name":"Miami University"}]},{"given":"Prakash","family":"Shrestha","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8309185"},{"volume-title":"Financial Cryptography and Data Security","author":"Galib Asadullah Al","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2537748"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"},{"volume-title":"White Paper","year":"2004","author":"Personal Authentication Real User","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Smudge Attacks on Smartphone Touch Screens","volume":"10","author":"Aviv Adam J","year":"2010","journal-title":"WOOT"},{"volume-title":"Usability Evaluation in Industry","author":"Brooke John","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.11.008"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176318"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947684"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"P Campisi E Maiorana M Lo Bosco and A Neri. 2009. User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3 4 (2009).  P Campisi E Maiorana M Lo Bosco and A Neri. 2009. User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3 4 (2009).","DOI":"10.1049\/iet-spr.2008.0171"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326257.1326259"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966945"},{"volume-title":"SIGCHI Conference on Human Factors in Computing Systems (CHI).","year":"2012","author":"Luca Alexander De","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979046"},{"volume-title":"Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication","year":"2013","author":"Frank M.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Hugo Gascon Sebastian Uellenbeck Christopher Wolf and Konrad Rieck. 2014. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.. In Sicherheit.  Hugo Gascon Sebastian Uellenbeck Christopher Wolf and Konrad Rieck. 2014. Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.. In Sicherheit."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2437652"},{"volume-title":"SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium.","author":"Jermyn Ian","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.24"},{"volume-title":"Network and Distributed System Security Symposium (NDSS).","year":"2013","author":"Li Lingjun","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544311"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858384"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590298"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991096"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857749"},{"key":"e_1_3_2_1_29_1","unstructured":"Adrian Perrig and Dawn Song. 1999. Hash Visualization: a New Technique to Improve Real-World Security. In CrypTEC.  Adrian Perrig and Dawn Song. 1999. Hash Visualization: a New Technique to Improve Real-World Security. In CrypTEC."},{"key":"e_1_3_2_1_30_1","unstructured":"Jeff Sauro. 2015. Measuring Usability with the System Usability Scale (SUS). February 2 2011. URL http:\/\/www.measuringusability.com\/sus.php (2015).  Jeff Sauro. 2015. Measuring Usability with the System Usability Scale (SUS). February 2 2011. URL http:\/\/www.measuringusability.com\/sus.php (2015)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516659"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500434"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702365"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"volume-title":"SOUPS: Proceedings of the second symposium on Usable privacy and security.","author":"Tari F.","key":"e_1_3_2_1_36_1"},{"volume-title":"The 20th Annual Network & Distributed System Security Symposium (NDSS","year":"2013","author":"Tey Chee Meng","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Toan Van Nguyen Napa Sae-Bae and Nasir Memon. 2017. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. computers & security 66 (2017) 115--128.  Toan Van Nguyen Napa Sae-Bae and Nasir Memon. 2017. DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. computers & security 66 (2017) 115--128.","DOI":"10.1016\/j.cose.2017.01.008"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Susan Wiedenbeck Jim Waters Jean-Camille Birget Alex Brodskiy and Nasir D. Memon. 2005. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. In International Journal of Human Computer Studies.  Susan Wiedenbeck Jim Waters Jean-Camille Birget Alex Brodskiy and Nasir D. Memon. 2005. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. In International Journal of Human Computer Studies.","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359838","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359838"}},"subtitle":["a comparative study of graphical patterns and cognitive games"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":40,"alternative-id":["10.1145\/3359789.3359838","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359838","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}