{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T12:26:53Z","timestamp":1648556813574},"reference-count":6,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2016edl8095","type":"journal-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T22:15:16Z","timestamp":1477952116000},"page":"2814-2816","source":"Crossref","is-referenced-by-count":2,"title":["A Visibility-Based Upper Bound for Android Unlock Patterns"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Jinwoo","family":"LEE","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, POSTECH"}]},{"given":"Jae Woo","family":"SEO","sequence":"additional","affiliation":[{"name":"Software R&D Center, Samsung Electronics Co."}]},{"given":"Kookrae","family":"CHO","sequence":"additional","affiliation":[{"name":"IoT and Robotics Research Division, DGIST"}]},{"given":"Pil Joong","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, POSTECH"}]},{"given":"Juneyeun","family":"KIM","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Myongji University"}]},{"given":"Seung Hoon","family":"CHOI","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Myongji University"}]},{"given":"Dae Hyun","family":"YUM","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Myongji University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] A.J. Aviv, K.L. Gibson, E. Mossop, M. Blaze, and J.M. Smith, \u201cSmudge Attacks on Smartphone Touch Screens,\u201d WOOT&apos;10, Proceedings of the 4th USENIX Conference on Offensive Technologies, pp.1-7, USENIX Association, 2010."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S. Uellenbeck, M. D\u00fcrmuth, C. Wolf, and T. Holz, \u201cQuantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns,\u201d CCS&apos;13, Proceedings of the 2013 ACM SIGSAC Conference on Computer &amp; Communications Security, pp.161-172, ACM, 2013.","DOI":"10.1145\/2508859.2516700"},{"key":"3","unstructured":"[3] CyanLockScreen, http:\/\/repo.xposed.info\/module\/com.conceptualideas.cyanlockscreen, 2016."},{"key":"4","unstructured":"[4] Security Lock Screen, https:\/\/apkpure.com\/security-lock-screen\/com.lsh.kwj.secure.lock.screen, 2016."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] A.J. Aviv, D. Budzitowski, and R. Kuber, \u201cIs Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android&apos;s Pattern Unlock,\u201d ACSAC&apos;15, Proceedings of the 31st Annual Computer Security Applications Conference, pp.301-310, ACM, 2015.","DOI":"10.1145\/2818000.2818014"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] G.C. Kessler, \u201cTechnology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory,\u201d JDFSL, vol.8, no.4, pp.57-64, 2013.","DOI":"10.15394\/jdfsl.2013.1156"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/11\/E99.D_2016EDL8095\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T05:22:49Z","timestamp":1568524969000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/11\/E99.D_2016EDL8095\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":6,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016edl8095","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}