{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T19:06:04Z","timestamp":1658343964159},"reference-count":20,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1587\/transinf.2019edp7181","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:12:53Z","timestamp":1593555173000},"page":"1623-1632","source":"Crossref","is-referenced-by-count":1,"title":["A Series of PIN\/Password Input Methods Resilient to Shoulder Hacking Based on Cognitive Difficulty of Tracing Multiple Key Movements"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Kokoro","family":"KOBAYASHI","sequence":"first","affiliation":[{"name":"Tokyo University of Agriculture and Technology"}]},{"given":"Tsuyoshi","family":"OGUNI","sequence":"additional","affiliation":[{"name":"NTT DATA"}]},{"given":"Masaki","family":"NAKAGAWA","sequence":"additional","affiliation":[{"name":"Tokyo University of Agriculture and Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] T.G. Willeby, \u201cSecure key entry using a graphical user interface,\u201d U.S. Patent Application No. US 20020188872 A1."},{"key":"2","unstructured":"[4] Y. Kakinuma and K. Maruyama, \u201cColor distance based authentication smartphone lock screens\u201d (in Japanese), Proc.76th National Convention of IPSJ, vol.1, pp.121-122, March 2014."},{"key":"3","unstructured":"[5] N. Hidaka, S Naguchi, and M. Okamoto, \u201cInput Password Only with Arrow Keys,\u201d Proc. 9th Symposium On Usable Privacy and Security, July 2013."},{"key":"4","unstructured":"[6] S. Sakurai and W. Takahashi, \u201cAuthentication methods for mobile phones\u201d (in Japanese), IPSJ SIG Technical Reports, no.122 (CSEC-19), pp.49-54, Dec. 2002."},{"key":"5","unstructured":"[7] A. KyuChoul and A.Y. Ha, \u201cPassword security input system using shift value of password key and password security input method thereof,\u201d US 20130047237 A1."},{"key":"6","unstructured":"[9] T. Takada, \u201cfakePointer: A user authentication scheme that makes peeping attack with a video camera hard,\u201d IPSJ Journal, vol.49, no.9, pp.3051-3061, Sept. 2008."},{"key":"7","unstructured":"[10] Y. Kita, F. Sugai, M. Park, and N. Okazaki, \u201cProposal and its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method: Secret Tap with Double Shift,\u201d Int. J. Cyber-Security and Digital Forensics, vol.2, no.1, pp.48-55, March 2013."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[11] K. Watanabe, F. Higuchi, M. Inami, and T. Igarashi, \u201cCursorCamouflage: Multiple dummy cursors as a defense against shoulder surfing,\u201d SIGGRAPH ASIA 2012 Emerging Technologies, Nov. 2012. DOI:10.1145\/2407707.2407713","DOI":"10.1145\/2407707.2407713"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[12] A.D. Luca, E.v. Zezschwitz, L. Pichler, and H. Husmann, \u201cUsing fake cursors to secure on-screen password entry,\u201d Proc. CHI 2013, Paris, France, pp.2390-2402, April 2013. DOI:10.1145\/2470654.2481331 10.1145\/2470654.2481331","DOI":"10.1145\/2470654.2481331"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[13] T. Matsumoto and H. Imai, \u201cHuman identification through insecure channel,\u201d Eurocrypt &apos;91, D.W. Davies, Ed., vol.547 of Lect. Notes Comput. Sci., Springer Verlag, pp.409-421, 1991. DOI:10.1007\/3-540-46416-6_35 10.1007\/3-540-46416-6_35","DOI":"10.1007\/3-540-46416-6_35"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[14] X.-Y. Li and S.-H. Teng, \u201cPractical human-machine identification over insecure channels,\u201d J. Combinatorial Optimization vol.3, no.4, pp.347-361, Dec. 1999. DOI:10.1023\/A:1009894418895 10.1023\/A:1009894418895","DOI":"10.1023\/A:1009894418895"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[15] N.J. Hopper and M. Blum, \u201cSecure human identification protocols,\u201d Proc. ASIACRYPT &apos;01, C. Boyd, Ed., vol.2249 of Lect. Notes Comput. Sci., Springer Verlag, pp.52-66, Dec. 2001. 10.1007\/3-540-45682-1_4","DOI":"10.1007\/3-540-45682-1_4"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[16] A. Jain, L. Hong, and S. Pankanti, \u201cBiometric identification,\u201d Commun. ACM vol.43, no.2, pp.90-98, Feb. 2000. DOI:10.1145\/328236.328110 10.1145\/328236.328110","DOI":"10.1145\/328236.328110"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[17] H. Sakano, \u201cA state of art of biometric person authentication technology\u201d (in Japanese), Japanese Journal of Forensic Science and Technology, vol.12, no.1, pp.1-12, June 2007. DOI:10.3408\/jafst.12.1 10.3408\/jafst.12.1","DOI":"10.3408\/jafst.12.1"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[18] V. Roth, K. Richard, and R. Freidinger, \u201cA pin-entry method resilient against shoulder surfing,\u201d Proc. 11th ACM Conference on Computer and Communication Security, Washington DC, USA, pp.236-245, Oct. 2004. DOI:10.1145\/1030083.1030116 10.1145\/1030083.1030116","DOI":"10.1145\/1030083.1030116"},{"key":"16","unstructured":"[19] D.S. Tan, P. Keyani, and M. Czerwinski, \u201cSpy-resistant keyboard: More secure password entry on public touch screen displays,\u201d Proc. OZCHI 2005, Canberra, Australia, pp.1-10, Nov. 2005."},{"key":"17","unstructured":"[20] K. Kobayashi, T. Oguni, and M. Nakagawa, \u201cA PIN code\/password input method resilient to shoulder hacking using difficulty of tracing multiple button movements\u201d (in Japanese), Proc. Computer Security Symposium 2017, pp.728-733, Oct. 2017."},{"key":"18","unstructured":"[21] K. Kobayashi, T. Oguni, and M. Nakagawa, \u201cUsability improvement of an anti-shoulder-hacking PIN code\/password input method exploiting tracing difficulty of multiple button movements\u201d (in Japanese), Proc. IPSJ Interaction 2018, pp.565-568, March 2018."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[22] J. Intriligator and P. Cavanagh, \u201cThe spatial resolution of visual attention,\u201d Cognitive Psychology, vol.43, no.3, pp.171-216, Nov. 2001. DOI:10.1006\/cogp.2001.0755 10.1006\/cogp.2001.0755","DOI":"10.1006\/cogp.2001.0755"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[23] Z.W. Pylyshyn and R.W. Storm, \u201cTracking multiple independent targets: Evidence for a parallel tracking mechanism,\u201d Spatial Vision, vol.3, pp.179-197, 1998. DOI:10.1163\/156856888X00122 10.1163\/156856888X00122","DOI":"10.1163\/156856888X00122"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019EDP7181\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T03:23:23Z","timestamp":1593833003000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019EDP7181\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":20,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7181","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}