{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:54:03Z","timestamp":1725803643583},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662449653"},{"type":"electronic","value":"9783662449660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_10","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T07:41:36Z","timestamp":1409125296000},"page":"101-110","source":"Crossref","is-referenced-by-count":5,"title":["Tag Digit Based Honeypot to Detect Shoulder Surfing Attack"],"prefix":"10.1007","author":[{"given":"Nilesh","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Banking- Personal Identification Number (PIN) Management and Security - Part 1: Basic Principles and Requirements for Online PIN Handling in ATM and POS Systems, Clause 5.4 Packaging Considerations, ISO 9564-1:2002 (2002)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-642-15497-3_18","volume-title":"Computer Security \u2013 ESORICS 2010","author":"H. Bojinov","year":"2010","unstructured":"Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: Loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 286\u2013302. Springer, Heidelberg (2010)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Chakraborty, N., Mondal, S.: Color Pass: An intelligent user interface to resist shoulder surfing attack. In: 2014 IEEE Students\u2019 Technology Symposium (TechSym), pp. 13\u201318 (2014)","DOI":"10.1109\/TechSym.2014.6807906"},{"key":"10_CR4","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-54525-2_31","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"N. Chakraborty","year":"2014","unstructured":"Chakraborty, N., Mondal, S.: SLASS: Secure login against shoulder surfing. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol.\u00a0420, pp. 346\u2013357. Springer, Heidelberg (2014)"},{"key":"10_CR5","unstructured":"Gardiner, S.: $217,000 \u2018Skimmed\u2019 from ATMs. The Wall Street Journal (June 2010)"},{"key":"10_CR6","unstructured":"Genc, Z.A., Kardas, S., Kiraz, M.S.: Examination of a new defense mechanism: Honeywords. IACR Cryptology ePrint Archive 2013, 696 (2013)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., and Ristenpart, T. Honey encryption: Security beyond the brute-force bound. IACR Cryptology ePrint Archive 2014, 155 (2014)","DOI":"10.1007\/978-3-642-55220-5_17"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: ACM Conference on Computer and Communications Security, pp. 145\u2013160 (2013)","DOI":"10.1145\/2508859.2516671"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"issue":"6","key":"10_CR11","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TSMC.2013.2270227","volume":"44","author":"T. Kwon","year":"2014","unstructured":"Kwon, T., Shin, S., Na, S.: Covert attentional shoulder surfing: Human adversaries are more powerful than expected. IEEE T. Systems, Man, and Cybernetics: Systems\u00a044(6), 716\u2013727 (2014)","journal-title":"IEEE T. Systems, Man, and Cybernetics: Systems"},{"key":"10_CR12","unstructured":"Mahansaria, D., Shyam, S., Samuel, A., Teja, R.: A fast and secure software solution [ss7.0] that counters shoulder surfing attack. In: 13th International Conference on Software Engineering and Application, pp. 190\u2013195 (2009)"},{"key":"10_CR13","unstructured":"Skynews. ATM \u2018shoulder surfing\u2019 card fraud on rise (June 2013), \n \n http:\/\/news.sky.com\/story\/1100203\/atm-shoulder-surfing-card-fraud-on-rise"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-642-14577-3_29","volume-title":"Financial Cryptography and Data Security","author":"T. Perkovi\u0107","year":"2010","unstructured":"Perkovi\u0107, T., \u010cagalj, M., Saxena, N.: Shoulder-surfing safe login in a partially observable attacker model. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 351\u2013358. Springer, Heidelberg (2010)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Roth, V., Richter, K., Freidinger, R.: A PIN-entry method resilient against shoulder surfing. In: ACM Conference Computer Communication Security, pp. 236\u2013245 (2004)","DOI":"10.1145\/1030083.1030116"},{"key":"10_CR16","unstructured":"Wilfong, G.: Method and appartus for secure pin entry. Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, ed. United States (1999)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, X.: S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 467\u2013472 (2007)","DOI":"10.1109\/AINAW.2007.317"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T13:46:56Z","timestamp":1558964816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}