{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T15:42:50Z","timestamp":1758814970439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377099","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Enhancing Smartphone Lock Security using Vibration Enabled Randomly Positioned Numbers"],"prefix":"10.1145","author":[{"given":"M. Monjirul","family":"Kabir","sequence":"first","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh"}]},{"given":"Nasimul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh"}]},{"given":"Md Khalid Hassan","family":"Tahmid","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh"}]},{"given":"Tanjil Ahmed","family":"Ovi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh"}]},{"given":"Victor Stany","family":"Rozario","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Manning Greenwich","author":"Ableson F.","year":"2009","unstructured":"F. Ableson, C. Collins, and R. Sen, Unlocking Android. Manning Greenwich, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_3_1","first-page":"1350","volume-title":"Electronics and Microelectronics (MIPRO)","author":"Taneski V.","year":"2015","unstructured":"V. Taneski, M. Heri\u010dko and B. Brumen, \"Impact of security education on password change,\" 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, 2015, pp. 1350--1355."},{"key":"e_1_3_2_1_4_1","first-page":"1161","volume-title":"Electronics and Microelectronics (MIPRO)","author":"Bo\u0161njak L.","year":"2018","unstructured":"L. Bo\u0161njak, J. Sre\u0161 and B. Brumen, \"Brute-force and dictionary attack on hashed real-world passwords,\" 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, 2018, pp. 1161--1166."},{"key":"e_1_3_2_1_5_1","volume-title":"Ft","author":"Patrick A. S.","year":"2003","unstructured":"A. S. Patrick, A. C. Long, and S. Flinn, \"HCI and Security Systems,\" presented at CHI, Extended Abstracts (Workshops). Ft. Lauderdale, Florida, USA., 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_7_1","volume-title":"May 09","author":"Gilhooly K.","year":"2005","unstructured":"K. Gilhooly, \"Biometrics: Getting Back to Business,\" in Computerworld, May 09, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(67)80067-7"},{"key":"e_1_3_2_1_9_1","first-page":"10","volume-title":"Graphical passwords: a survey,\" 21st Annual Computer Security Applications Conference (ACSAC'05)","author":"Suo Xiaoyuan","year":"2005","unstructured":"Xiaoyuan Suo, Ying Zhu and G. S. Owen, \"Graphical passwords: a survey,\" 21st Annual Computer Security Applications Conference (ACSAC'05), Tucson, AZ, 2005, pp. 10 pp.-472."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Wimberly Hugh","year":"2012","unstructured":"Hugh Wimberly, Lorie M.Liebrock, ---Using Fingerprint Authentication to Reduce System Security: An Empirical Study ---, IEEE Symposium on Security and Privacy, 2012, Pp.32--46."},{"volume-title":"International Journal of Computer Science and Management Research. [Online]","author":"Bhutani Tarika","key":"e_1_3_2_1_11_1","unstructured":"Tarika Bhutani, Bhawna Bhutani. (Oct. 2013) ---No To Fingerprint Security System||, International Journal of Computer Science and Management Research. [Online] Vol. 2 Issue 10.Available:http:\/\/www.ijcsmr.org\/vol2issue10\/paper532.pdf [Nov. 12, 2014]"},{"key":"e_1_3_2_1_12_1","first-page":"e7","volume-title":"Proc. 4th USENIX conference on offensive technologies (WOOT' 10)","author":"Aviv AJ","year":"2010","unstructured":"Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM. Smudge attacks on smartphone touch screens. In: Proc. 4th USENIX conference on offensive technologies (WOOT' 10) 2010.pp. 1e7"},{"key":"e_1_3_2_1_13_1","unstructured":"Seunghun Cha1 Sungsu Kwag1 Hyoungshick Kim1 and Jun Ho Huh2 Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks."},{"key":"e_1_3_2_1_14_1","unstructured":"Yu Wang1 and Yuqing Zhang2 1* Kai Wang2 and Jingbo Yan1 Security Analysis and Vulnerability Detection of Gesture-based Lock in Android Applications"},{"key":"e_1_3_2_1_15_1","unstructured":"S.Milton Ganesh P. Vijayakumar L. Jegatha Deborah \" A secure gesture based authentication scheme to unlock the smartphones\""},{"key":"e_1_3_2_1_16_1","unstructured":"Taekyoung Kwon* Sarang Na \" TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems\""},{"key":"e_1_3_2_1_17_1","unstructured":"Manjunath G Satheesh K Saranyadevi C Nithya M \" Text-Based Shoulder Surfing Resistant Graphical Password Scheme\""},{"key":"e_1_3_2_1_18_1","unstructured":"Mirang park Yoshihiro Kita kentaro Aburada Naonobu Okazaki \"Proposal of a Puzzle Authentication Method With Shoulder-surfing Attack Resistance\""},{"key":"e_1_3_2_1_19_1","unstructured":"Katharina Krombholz Thomas Hupperich Thorsten Holz \"Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices\""},{"key":"e_1_3_2_1_20_1","unstructured":"Pekka Parhi* Amy K. Karlson Benjamin B. Bederson \" Target Size Study for One-Handed Thumb Use on Small Touchscreen Devices\""},{"key":"e_1_3_2_1_21_1","unstructured":"Jessica Conradi* Olivia Busch Thomas Alexander \"]Optimal touch button size for the use of mobile devices while walking\""},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Fitts PM. The information capacity of the human motor system in controlling the amplitude of movement. J Exp Psychol 1992;121:262e9.","DOI":"10.1037\/\/0096-3445.121.3.262"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462098"}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:38Z","timestamp":1750202618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":23,"alternative-id":["10.1145\/3377049.3377099","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377099","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}