{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T11:13:55Z","timestamp":1694517235820},"reference-count":36,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T00:00:00Z","timestamp":1490745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFC040160502"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20160287"],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2018,2,10]]},"abstract":"Summary<\/jats:title>Secure mechanisms have been adapted to satisfy the needs of mobile subscribers; however, the mobile environment is quite different from a desktop PC or laptop\u2010based environment. The existing attack patterns in mobile environments are also quite different, and the countermeasures applied should be enhanced. In regards to usability, the mobile environment is based on mobility, and thus, mobile devices are designed and developed to enhance the owner's efficiency. To avoid forgetting passwords, people are willing to adopt simple alphanumeric\u2010character combinations, which are easy to remember and convenient to enter. As a result, the passwords have a high probability of being cracked or exposed. In this paper, we study the potential security problems caused by simple and weak passwords, discuss drawbacks of some conventional works, and propose 3 creative schemes to increase the complexity and strength of passwords by applying the envisioned features. Note that our proposals are based on the assumption that the textual passwords are not difficult for users to remember or enter and do not cause inconvenience to users. In other words, the proposed methods can increase the complexity of simple passwords without the awareness of users.<\/jats:p>","DOI":"10.1002\/cpe.4150","type":"journal-article","created":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T03:02:45Z","timestamp":1490842965000},"source":"Crossref","is-referenced-by-count":3,"title":["User biometric information\u2010based secure method for smart devices"],"prefix":"10.1002","volume":"30","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7020-9905","authenticated-orcid":false,"given":"Xin","family":"Su","sequence":"first","affiliation":[{"name":"College of IOT Engineering Hohai University Changzhou China"}]},{"given":"Bingying","family":"Wang","sequence":"additional","affiliation":[{"name":"College of IOT Engineering Hohai University Changzhou China"}]},{"given":"Xuewu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of IOT Engineering Hohai University Changzhou China"}]},{"given":"Yupeng","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering Shenyang Aerospace University Shenyang China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1535-646X","authenticated-orcid":false,"given":"Dongmin","family":"Choi","sequence":"additional","affiliation":[{"name":"Division of Undeclared Majors Chosun University Gwangju South Korea"}]}],"member":"311","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"issue":"4","key":"e_1_2_6_2_1","first-page":"1","article-title":"Certificate\u2010based encryption with keyword search: enabling secure authorization in electronic health record","volume":"6","author":"Gritti C","year":"2016","journal-title":"J Internet Serv Inf Secur"},{"key":"e_1_2_6_3_1","volume-title":"Securing Information Assets : Understanding, Measuring and Protecting Against Social Engineering Attacks","author":"Nohlberg M","year":"2008"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0212"},{"key":"e_1_2_6_5_1","doi-asserted-by":"crossref","unstructured":"Marc AlexanderKowtko.Biometric authentication for older adults.IEEE Long Island Systems Applications and Technology (LISAT) Conference June 2014. IEEE Computer Society Press: Los Alamitos CA 2014;1\u20106.https:\/\/doi.org\/10.1109\/LISAT.2014.6845213","DOI":"10.1109\/LISAT.2014.6845213"},{"key":"e_1_2_6_6_1","doi-asserted-by":"crossref","unstructured":"Ar KarKyaw FrancoSioquim JustinJoseph.Dictionary attack on Wordpress: security and forensic analysis.2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) November 2015. IEEE Computer Society Press: Los Alamitos CA 2015;158\u2010164.https:\/\/doi.org\/10.1109\/InfoSec.2015.7435522","DOI":"10.1109\/InfoSec.2015.7435522"},{"key":"e_1_2_6_7_1","doi-asserted-by":"crossref","unstructured":"HyungjunShin DeayoungKim JunbeomHur.Secure pattern\u2010based authentication against shoulder surfing attack in smart devices.2015 Seventh International Conference on Ubiquitous and Future Networks July 2015. IEEE Computer Society Press: Los Alamitos CA 2015;13\u201018.https:\/\/doi.org\/10.1109\/ICUFN.2015.7182486","DOI":"10.1109\/ICUFN.2015.7182486"},{"key":"e_1_2_6_8_1","doi-asserted-by":"crossref","unstructured":"QiongGui WeiYang ZhanpengJin Maria V.Ruiz\u2010Blondet SarahLaszlo.A residual feature\u2010based replay attack detection approach for brainprint biometric systems.2016 IEEE International Workshop on Information Forensics and Security (WIFS) December 2016. IEEE Computer Society Press: Los Alamitos CA 2016;1\u20106.https:\/\/doi.org\/10.1109\/WIFS.2016.7823907","DOI":"10.1109\/WIFS.2016.7823907"},{"key":"e_1_2_6_9_1","unstructured":"SpywareWorkshop:Monitoring software on your personal computer: spyware adware and other software: report of the Federal Trade Commission staff.https:\/\/www.ftc.gov\/reports\/spyware\u2010workshop\u2010monitoring\u2010software\u2010your\u2010personal\u2010computer\u2010spyware\u2010adware\u2010other\u2010software[Accessed on 7 March 2005]."},{"key":"e_1_2_6_10_1","doi-asserted-by":"crossref","unstructured":"ElhamDarbanian Gh.Dastghaiby Fard.A graphical password against spyware and shoulder\u2010surfing attacks.Computer Science and Software Engineering (CSSE) 2015 International Symposium on August 2015. IEEE Computer Society Press: Los Alamitos CA 2016;1\u20106.https:\/\/doi.org\/10.1109\/CSICSSE.2015.7369239","DOI":"10.1109\/CSICSSE.2015.7369239"},{"issue":"12","key":"e_1_2_6_11_1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/322796.322806","article-title":"Users are not the enemy: why users comprise computer security mechanisms and how to take remedial measures","volume":"42","author":"Adams A","year":"1999","journal-title":"Commun ACM"},{"key":"e_1_2_6_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0216-7"},{"key":"e_1_2_6_13_1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-3-642-32946-3_3","article-title":"A birthday present every eleven wallets? The security of customer\u2010chosen banking PINs","volume":"7397","author":"Bonneau J","year":"2012","journal-title":"Financ Cryptogr (Lect. Notes Comput. Sci)"},{"key":"e_1_2_6_14_1","doi-asserted-by":"crossref","unstructured":"TaekyoungKwon SarangNa.SwitchPIN: securing smartphone PIN entry with switchable keypads.2014 IEEE International Conference on Consumer Electronics (ICCE) January 2014. IEEE Computer Society Press: Los Alamitos CA 2014;23\u201024.https:\/\/doi.org\/10.1109\/ICCE.2014.6775892","DOI":"10.1109\/ICCE.2014.6775892"},{"key":"e_1_2_6_15_1","doi-asserted-by":"crossref","unstructured":"HoyulChoi HyunsooKwon JunbeomHur.A secure OTP algorithm using a smartphone application.2015 Seventh International Conference on Ubiquitous and Future Networks July 2015. IEEE Computer Society Press: Los Alamitos CA 2015;476\u2010481.https:\/\/doi.org\/10.1109\/ICUFN.2015.7182589","DOI":"10.1109\/ICUFN.2015.7182589"},{"key":"e_1_2_6_16_1","doi-asserted-by":"crossref","unstructured":"Jorge AguilaVila JetzabelSerna\u2010Olvera LuisFernandez ManelMedina AndreasSfakianakis.A professional view on eBanking authentication: challenges and recommendations.Information Assurance and Security (IAS) 2013 9th International Conference on December 2013. IEEE Computer Society Press: Los Alamitos CA 2013;43\u201048.https:\/\/doi.org\/10.1109\/ISIAS.2013.6947731","DOI":"10.1109\/ISIAS.2013.6947731"},{"key":"e_1_2_6_17_1","unstructured":"How does screen size effect viewer's response to various types of media?http:\/\/screenmediaucsd.wikispaces.com\/\u2010\/Term%20Wiki%20WI15\/Team%2016\/How+does+screen+size+effect+viewer%27s+response+to+various+types+of+media%3F[Accessed on 15 March 2015]."},{"issue":"3","key":"e_1_2_6_18_1","first-page":"21","article-title":"Implementation of secure virtual financial keypad for shoulder surfing attack","volume":"23","author":"Kim H","year":"2013","journal-title":"Korea Inst Inform Sec Cryptogr"},{"issue":"99","key":"e_1_2_6_19_1","first-page":"1","article-title":"A shoulder surfing resistant graphical authentication system","author":"Sun H\u2010M","year":"2016","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"e_1_2_6_20_1","doi-asserted-by":"crossref","unstructured":"T.Takada.FakePointer: an authentication scheme for improving security against peeping attacks using video cameras.International Conference on Mobile Ubiquitous Computing Systems Services and Technologies September 2008. IEEE Computer Society Press: Los Alamitos CA 2008;XX\u2010XX.https:\/\/doi.org\/10.1109\/UBICOMM.2008.76","DOI":"10.1109\/UBICOMM.2008.76"},{"key":"e_1_2_6_21_1","unstructured":"A. J.Aviv K.Gibson E.Mossop M.Blaze J. M.Smith.Smudge attacks on smartphone touch screens.USENIX Conference on Offensive Technologies August 2010. ACM: New York 2010;1\u20107."},{"key":"e_1_2_6_22_1","unstructured":"Reverse smudge engineering foils android unlock security.http:\/\/www.cnet.com\/news\/reverse\u2010smudge\u2010engineering\u2010foils\u2010android\u2010unlock\u2010security[Accessed on 14 February 2012]."},{"key":"e_1_2_6_23_1","unstructured":"L.Cai H.Chen.TouchLogger: inferring keystrokes on touch screen from smartphone motion.Proceedings of the 6th USENIX conference on Hot topics in security August 2011. ACM: New York 2011;9\u20109."},{"key":"e_1_2_6_24_1","doi-asserted-by":"crossref","unstructured":"E.Miluzzo A.Varshavsky S.Balakrishnan R.R.Choudhury.TapPrints: Your finger taps have fingerprints.Proceedings of the 10th international conference on Mobile systems applications and services June 2012. ACM: New York 2012;323\u2010336.https:\/\/doi.org\/10.1145\/2307636.2307666","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_2_6_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.097"},{"issue":"1","key":"e_1_2_6_26_1","first-page":"58","article-title":"Towards cognitive cryptography","volume":"4","author":"Ogiela L","year":"2014","journal-title":"J Internet Serv Inf Secur"},{"issue":"3","key":"e_1_2_6_27_1","first-page":"129","article-title":"Ogiela*, Lidia Ogiela, and Urszula Ogiela. Strategic information splitting using biometric patterns","volume":"2","author":"Marek R","year":"2012","journal-title":"J Internet Serv Inf Secur"},{"key":"e_1_2_6_28_1","unstructured":"Direct gesture\u2010based actions from device's lock screen.http:\/\/www.google.com\/patents\/US8136053[Accessed on 13 March 2012]."},{"issue":"3","key":"e_1_2_6_29_1","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/S0167-4048(02)00304-8","article-title":"Acceptance of subscriber authentication methods for mobile telephony devices","volume":"21","author":"Clarke NL","year":"2002","journal-title":"Comput Secur"},{"key":"e_1_2_6_30_1","first-page":"5","volume-title":"Spoken Language Technology Workshop","author":"Das A","year":"2008"},{"key":"e_1_2_6_31_1","unstructured":"K. H.Kamer A.Yuksel A.Jahnbekam M.Roshan\u2010del D.Skirpo.MagiSign: user identification\/authentication based on 3D around device magnetic signatures. The Fourth International Conference on Mobile Ubiquitous Computing Systems Services and Technologies October 2010. IARIA: New York2010;31\u201034."},{"key":"e_1_2_6_32_1","doi-asserted-by":"crossref","unstructured":"H.Ketabdar P.Moghadam B.Naderi M.Roshandel.Magnetic signatures in air for mobile devices.MobileHCI '12 Proceedings of the 14th international conference on Human\u2010computer interaction with mobile devices and services companion September 2012. ACM: New York2012;185\u2010188.https:\/\/doi.org\/10.1145\/2371664.2371705","DOI":"10.1145\/2371664.2371705"},{"key":"e_1_2_6_33_1","unstructured":"F.Li N.Clarke M.Papadaki P.Dowland.Behaviour profiling for transparent authentication for mobile devices.10th European Conference on Information Warfare and Security July 2011. Academic Publishing Ltd: UK2011;307\u2010314."},{"key":"e_1_2_6_34_1","unstructured":"KeystrokeRecognition.http:\/\/www.deepnetsecurity.com\/authenticators\/biometrics\/typesense[Accessed on 27 April 2016]."},{"key":"e_1_2_6_35_1","doi-asserted-by":"crossref","unstructured":"M.Shakir A.A.Khan.S3TFPAS: scalable shoulder surfing resistant textual\u2010formula base password authentication system.Computer Science and Information Technology (ICCSIT) 2010 3rd IEEE International Conference on July 2010. IEEE Computer Society Press: Los Alamitos CA 2010;12\u201014.https:\/\/doi.org\/10.1109\/ICCSIT.2010.5564479","DOI":"10.1109\/ICCSIT.2010.5564479"},{"key":"e_1_2_6_36_1","unstructured":"Iphone and galaxy phone penetrated by fake fingerprint.http:\/\/www.etnews.com\/20160217000327[Accessed on 27 April 2016]."},{"key":"e_1_2_6_37_1","doi-asserted-by":"crossref","unstructured":"X.Su B.Y.Wang C.Choi D.M.Choi.Case study on password complexity enhancement for smart devices.5th IEEE CCNC International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2017) January 2017. IEEE Computer Society Press: Los Alamitos CA 2017;XX\u2010XX.","DOI":"10.1109\/CCNC.2017.8013419"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.4150","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.4150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T16:46:55Z","timestamp":1694450815000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.4150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,29]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,2,10]]}},"alternative-id":["10.1002\/cpe.4150"],"URL":"https:\/\/doi.org\/10.1002\/cpe.4150","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,29]]}}}