{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:55Z","timestamp":1725771295921},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_31","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"346-357","source":"Crossref","is-referenced-by-count":3,"title":["SLASS: Secure Login against Shoulder Surfing"],"prefix":"10.1007","author":[{"given":"Nilesh","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Backes, M., Drmuth, M., Unruh, D.: Compromising reflections -or- how to read lcd monitors around the corner. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP), Oakland, CA (May 2008)","DOI":"10.1109\/SP.2008.25"},{"key":"31_CR2","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.: Graphical passwords: Learning from the first generation. technical report tr-09-09, school of computer science, carleton university (2009)"},{"key":"31_CR3","unstructured":"Blonder, G.E.: Graphical passwords. Lucent Technologies, Inc., Murray Hill, NJ, U. S. patent, ed. United States (June 1996)"},{"issue":"2","key":"31_CR4","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing\u00a015(2), 364\u2013383 (1986)","journal-title":"SIAM Journal on Computing"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-03549-4_14","volume-title":"Financial Cryptography and Data Security","author":"C. Herley","year":"2009","unstructured":"Herley, C., van Oorschot, P.C., Patrick, A.S.: Passwords: If we\u2019re so smart, why are we still using them? In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 230\u2013237. Springer, Heidelberg (2009)"},{"key":"31_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and Other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"31_CR7","unstructured":"Li, Z., Sun, Q., Lian, Y., Giusto, D.D.: An association-based graphical password design resistant to shoulder surfing attack. In: IEEE International Conference on Multimedia and Expo. (ICME) (2005)"},{"key":"31_CR8","unstructured":"Mahansaria, D., Shyam, S., Samuel, A., Teja, R.: A fast and secure software solution [ss7.0] that counters shoulder surfing attack. In: 13th IASTED International Conference Software Engineering and Applications, pp. 190\u2013195 (2009)"},{"key":"31_CR9","unstructured":"Paivio, A.: Mind and its evaluation: A dual coding theoretical approach (2006)"},{"key":"31_CR10","unstructured":"Perkovic, T., Cagali, M., Rakic, N.: SSSL: Shoulder surfing safe login. In: Software Telecommunications and Computer Networks, pp. 270\u2013275 (2009)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Roth, V., Ritcher, K., Freidinger, R.: A pin-entry method resilient against shoulder surfing. In: ACM Conf. Comput. Commun. Security, pp. 236\u2013245 (2004)","DOI":"10.1145\/1030083.1030116"},{"issue":"2","key":"31_CR12","first-page":"273","volume":"7","author":"H. Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-Go:A proposal to improve the usability of graphical passwords. International Journal of Network Security\u00a07(2), 273\u2013292 (2008)","journal-title":"International Journal of Network Security"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-642-14577-3_29","volume-title":"Financial Cryptography and Data Security","author":"T. Perkovi\u0107","year":"2010","unstructured":"Perkovi\u0107, T., \u010cagalj, M., Saxena, N.: Shoulder-surfing safe login in a partially observable attacker model. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 351\u2013358. Springer, Heidelberg (2010)"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N.: Passpoints: Design and longitudinal evaluation of a graphical password system. Special Issue on HCI Research in Privacy and Security, International Journal of Human-Computer Studies (2005) (in press)","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"31_CR15","unstructured":"Wilfong, G.: Method and appartus for secure pin entry. US Patent No. 5,940,511. Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed. United States (1997)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, X.: S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 467\u2013472 (2007)","DOI":"10.1109\/AINAW.2007.317"},{"key":"31_CR17","unstructured":"Zhou, Y., Feng, D.: Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing (2005)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:11:47Z","timestamp":1558851107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}