{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T05:25:03Z","timestamp":1701494703707},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11704-019-9134-9","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T12:03:01Z","timestamp":1601640181000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries"],"prefix":"10.1007","volume":"15","author":[{"given":"Nilesh","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"9134_CR1","doi-asserted-by":"crossref","unstructured":"Bonneau J, Cormac H, Paul C, Van O, Stajano F. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of IEEE Symposium on Security and Privacy. 2012, 553\u2013567","DOI":"10.1109\/SP.2012.44"},{"issue":"4","key":"9134_CR2","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/TDSC.2015.2413410","volume":"13","author":"X Pan","year":"2016","unstructured":"Pan X, Ling Z, Pingley A, Yu W, Zhang N, Ren K, Fu X. Password extraction via reconstructed wireless mouse trajectory. IEEE Transactions on Dependable and Secure Computing, 2016, 13(4): 461\u2013473","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9134_CR3","doi-asserted-by":"crossref","unstructured":"Wang D, Zhang Z, Wang P, Yan J, Huang X. Targeted online password guessing: an underestimated threat. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. 2016, 1242\u20131254","DOI":"10.1145\/2976749.2978339"},{"issue":"6","key":"9134_CR4","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s10207-016-0348-7","volume":"15","author":"M Manulis","year":"2016","unstructured":"Manulis M, Stebila D, Kiefer F, Denham N. Secure modular password authentication for the web using channel bindings. International Journal of Information Security, 2016, 15(6): 597\u2013620","journal-title":"International Journal of Information Security"},{"key":"9134_CR5","doi-asserted-by":"crossref","unstructured":"Kontaxis G, Athanasopoulos E, Portokalidis G, Keromytis D A. Sauth: protecting user accounts from password database leaks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2013, 187\u2013198","DOI":"10.1145\/2508859.2516746"},{"issue":"1","key":"9134_CR6","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2014.10.008","volume":"48","author":"Q Yan","year":"2015","unstructured":"Yan Q, Han J, Li Y, Zhou J, Deng R. Leakage-resilient password entry: challenges, design, and evaluation. Computers & Security, 2015, 48(1): 196\u2013211","journal-title":"Computers & Security"},{"key":"9134_CR7","doi-asserted-by":"crossref","unstructured":"Bai X, Gu W, Chellappan S, Wang X, Xuan D, Ma B. PAS: predicate-based authentication services against powerful passive adversaries. In: Proceedings of the IEEE Computer Security Applications Conference. 2008, 433\u2013442","DOI":"10.1109\/ACSAC.2008.23"},{"issue":"2","key":"9134_CR8","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/TDSC.2016.2539942","volume":"15","author":"M H Sun","year":"2018","unstructured":"Sun M H, Chen T S, Yeh H J, Cheng Y C. A shoulder surfing resistant graphical authentication system. IEEE Transactions on Dependable and Secure Computing, 2018, 15(2): 180\u2013193","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9134_CR9","doi-asserted-by":"crossref","unstructured":"Wiese O, Roth V. Pitfalls of shoulder surfing studies. In: Proceedings of the Internet Society NDSS Workshop on Usable Security. 2015, 1\u20136","DOI":"10.14722\/usec.2015.23007"},{"key":"9134_CR10","doi-asserted-by":"crossref","unstructured":"Kim D, Dunphy P, Briggs P, Hook J, Nicholson W J, Nicholson J, Olivier P. Multi-touch authentication on tabletops. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. 2010, 1093\u20131102","DOI":"10.1145\/1753326.1753489"},{"key":"9134_CR11","doi-asserted-by":"crossref","unstructured":"Schaub F, Walch M, K\u00f6nings B, Weber M. Exploring the design space of graphical passwords on smartphones. In: Proceedings of the ACM Symposium on Usable Privacy and Security. 2013, 1\u201314","DOI":"10.1145\/2501604.2501615"},{"key":"9134_CR12","doi-asserted-by":"crossref","unstructured":"Tari F, Ozok A, Holden S. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the ACM Symposium on Usable Privacy and Security. 2006, 56\u201366","DOI":"10.1145\/1143120.1143128"},{"key":"9134_CR13","doi-asserted-by":"crossref","unstructured":"Schaub F, Deyhle R, Weber M. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the ACM International Conference on Mobile and Ubiquitous Multimedia. 2012, 1\u201313","DOI":"10.1145\/2406367.2406384"},{"key":"9134_CR14","doi-asserted-by":"crossref","unstructured":"Wiedenbeck S, Waters J, Sobrado L, Birget C J. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the ACM Working Conference on Advanced Visual Interfaces. 2006, 177\u2013184","DOI":"10.1145\/1133265.1133303"},{"key":"9134_CR15","doi-asserted-by":"crossref","unstructured":"Zhao H, Li X. S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme. In: Proceedings of the IEEE Advanced Information Networking and Applications Workshops. 2007, 467\u2013472","DOI":"10.1109\/AINAW.2007.317"},{"issue":"3","key":"9134_CR16","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TIFS.2014.2376177","volume":"10","author":"M \u010cagalj","year":"2015","unstructured":"\u010cagalj M, Perkovi\u0107 T, Bugari\u0107 M. Timing attacks on cognitive authentication schemes. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 584\u2013596","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9134_CR17","unstructured":"Yan Q, Han J, Li Y, Deng H R. On limitations of designing leakage-resilient password systems: attacks, principals and usability. In: Proceedings of the Annual Network and Distributed System Security Symposium. 2012, 1\u201316"},{"key":"9134_CR18","doi-asserted-by":"crossref","unstructured":"Weir M, Aggarwal S, Collins M, Stern H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the ACM Conference on Computer and Communications Security. 2010, 162\u2013175","DOI":"10.1145\/1866307.1866327"},{"key":"9134_CR19","volume-title":"Cryptography and Network Security","author":"B Forouzan","year":"2011","unstructured":"Forouzan B, Mukhopadhyay D. Cryptography and Network Security. 2nd ed. India: McGraw-Hill Education, 2011","edition":"2nd ed."},{"key":"9134_CR20","doi-asserted-by":"crossref","unstructured":"Matsumoto T, Imai H. Human identification through insecure channel. In: Proceedings of Advances in Cryptology-EUROCRYPT, 91. 1991, 409\u2013421","DOI":"10.1007\/3-540-46416-6_35"},{"issue":"1","key":"9134_CR21","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1049\/iet-ifs.2017.0538","volume":"13","author":"N Chakraborty","year":"2018","unstructured":"Chakraborty N, Mondal S. Towards incorporating honeywords in n-session recording attack resilient unaided authentication services. IET Information Security, 2018, 13(1): 7\u201318","journal-title":"IET Information Security"},{"key":"9134_CR22","doi-asserted-by":"crossref","unstructured":"Asghar J H, Pieprzyk J, Wang H. A new human identification protocol and coppersmith\u2019s baby-stepgiant-step algorithm. In: Proceedings of the International Conference on Applied Cryptography and Network Security. 2010, 349\u2013366","DOI":"10.1007\/978-3-642-13708-2_21"},{"key":"9134_CR23","doi-asserted-by":"crossref","unstructured":"De Luca A, Hertzschuch K, Hussmann H. Colorpin: securing pin entry through indirect input. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. 2010, 1103\u20131106","DOI":"10.1145\/1753326.1753490"},{"key":"9134_CR24","doi-asserted-by":"crossref","unstructured":"Hopper N J, Blum M. Secure human identification protocols. In: Proceedings of Advances in Cryptology-ASIACRYPT 2001. 2001, 52\u201366","DOI":"10.1007\/3-540-45682-1_4"},{"key":"9134_CR25","doi-asserted-by":"crossref","unstructured":"Juels A, Rivest R L. Honeywords: making password-cracking detectable. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2013, 145\u2013160","DOI":"10.1145\/2508859.2516671"},{"key":"9134_CR26","doi-asserted-by":"crossref","unstructured":"Camenisch J, Lehmann A, Neven G. Optimal distributed password verification. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2015, 182\u2013194","DOI":"10.1145\/2810103.2813722"},{"key":"9134_CR27","doi-asserted-by":"crossref","unstructured":"Weinshall D. Cognitive authentication schemes safe against spyware. In: Proceedings of the IEEE Symposium on Security and Privacy. 2006, 6\u201311","DOI":"10.1109\/SP.2006.10"},{"key":"9134_CR28","unstructured":"De Luca A. Designing usable and secure authentication mechanisms for public spaces. LMU, PhD Thesis, 2011"},{"key":"9134_CR29","doi-asserted-by":"crossref","unstructured":"Roth V, Richter K, Freidinger R. A PIN-entry method resilient against shoulder surfing. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004, 236\u2013245","DOI":"10.1145\/1030083.1030116"},{"issue":"6","key":"9134_CR30","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TSMC.2013.2270227","volume":"44","author":"T Kwon","year":"2014","unstructured":"Kwon T, Shin S, Na S. Covert attentional shoulder surfing: human adversaries are more powerful than expected. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2014, 44(6): 716\u2013727","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"9134_CR31","unstructured":"Flor\u00eancio D, Herley C, Coskun B. Do strong web passwords accomplish anything? In: Proceedings of USENIX Workshop on Hot Topics in Security. 2007, 1\u20136"},{"key":"9134_CR32","doi-asserted-by":"crossref","unstructured":"Sasamoto H, Christin N, Hayashi E. Undercover: authentication usable in front of prying eyes. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. 2008, 183\u2013192","DOI":"10.1145\/1357054.1357085"},{"issue":"4","key":"9134_CR33","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2004","unstructured":"Broder A, Mitzenmacher M. Network applications of bloom filters: a survey. Internet Mathematics, 2004, 1(4): 485\u2013509","journal-title":"Internet Mathematics"},{"issue":"4","key":"9134_CR34","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.cose.2018.12.002","volume":"81","author":"Q Do","year":"2019","unstructured":"Do Q, Martini B, Choo R K. The role of the adversary model in applied security research. Computers & Security, Elsevier, 2019, 81(4): 156\u2013181","journal-title":"Computers & Security, Elsevier"},{"issue":"2","key":"9134_CR35","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Sciences, 1984, 28(2): 270\u2013299","journal-title":"Journal of Computer and System Sciences"},{"key":"9134_CR36","doi-asserted-by":"crossref","unstructured":"Phan D H, Pointcheval D. About the security of ciphers (semantic security and pseudo-random permutations). In: Proceedings of the International Workshop on Selected Areas in Cryptography. 2004, 182\u2013197","DOI":"10.1007\/978-3-540-30564-4_13"},{"issue":"1","key":"9134_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-005-0432-z","volume":"20","author":"N Koblitz","year":"2007","unstructured":"Koblitz N, Alfred J M. Another look at \u201cprovable security\u201d. Journal of Cryptology Springer, 2007, 20(1): 3\u201337","journal-title":"Journal of Cryptology Springer"},{"key":"9134_CR38","doi-asserted-by":"crossref","unstructured":"Wagner D, Goldberg I. Proofs of security for the UNIX password hashing algorithm. In: Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. 2000, 560\u2013572","DOI":"10.1007\/3-540-44448-3_43"},{"issue":"3","key":"9134_CR39","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/2730908","volume":"21","author":"S Kamara","year":"2015","unstructured":"Kamara S. Encrypted search. ACM Crossroads, 2015, 21(3): 30\u201334","journal-title":"ACM Crossroads"},{"key":"9134_CR40","doi-asserted-by":"crossref","unstructured":"Das A, Bonneau J, Caesar M, Borisov N, Wang X. The tangled web of password reuse. In: Proceedings of the Annual Network and Distributed System Security Symposium. 2014, 1\u201316","DOI":"10.14722\/ndss.2014.23357"},{"issue":"4","key":"9134_CR41","first-page":"421","volume":"57","author":"S Sternberg","year":"1969","unstructured":"Sternberg S. Memory-scanning: mental processes revealed by reaction-time experiments. American Scientist, 1969, 57(4): 421\u2013457","journal-title":"American Scientist"},{"issue":"2","key":"9134_CR42","first-page":"384","volume":"27","author":"A P Nobel","year":"2001","unstructured":"Nobel A P, Shiffrin M R. Retrieval processes in recognition and cued recall. Journal of Experimental Psychology: Learning, Memory, and Cognition American Psychological Association, 2001, 27(2): 384","journal-title":"Journal of Experimental Psychology: Learning, Memory, and Cognition American Psychological Association"},{"issue":"4\u20138","key":"9134_CR43","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1080\/13506280500197397","volume":"14","author":"G F Woodman","year":"2006","unstructured":"Woodman G F, Chun M M. The role of working memory and long-term memory in visual search. Visual Cognition Taylor & Francis, 2006, 14(4\u20138): 808\u2013830","journal-title":"Visual Cognition Taylor & Francis"},{"issue":"2","key":"9134_CR44","first-page":"299","volume":"130","author":"J Campbell","year":"2001","unstructured":"Campbell J, Xue Q. Cognitive arithmetic across cultures. American Psychological Association Journal of Experimental Psychology: General, 2001, 130(2): 299\u2013315","journal-title":"American Psychological Association Journal of Experimental Psychology: General"},{"issue":"5","key":"9134_CR45","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1080\/09541440701688793","volume":"20","author":"L Corbin","year":"2008","unstructured":"Corbin L, Marquer J. Effect of a simple experimental control: the recall constraint in sternberg\u2019s memory scanning task. European Journal of Cognitive Psychology Taylor & Francis, 2008, 20(5): 913\u2013935","journal-title":"European Journal of Cognitive Psychology Taylor & Francis"},{"issue":"2","key":"9134_CR46","doi-asserted-by":"publisher","first-page":"269","DOI":"10.3758\/BF03196569","volume":"11","author":"G F Woodman","year":"2004","unstructured":"Woodman G F, Luck S J. Visual search is slowed when visuospatial working memory is occupied. Psychonomic Bulletin & Review Springer, 2004, 11(2): 269\u2013274","journal-title":"Psychonomic Bulletin & Review Springer"},{"issue":"5","key":"9134_CR47","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/S0022-5371(71)80029-4","volume":"10","author":"R M Hogan","year":"1971","unstructured":"Hogan R M, Kintsch W. Differential effects of study and test trials on long-term recognition and recall. Journal of Verbal Learning and Verbal Behavior Elsevier, 1971, 10(5): 562\u2013567","journal-title":"Journal of Verbal Learning and Verbal Behavior Elsevier"},{"issue":"1","key":"9134_CR48","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.cose.2016.03.003","volume":"59","author":"P S Teh","year":"2016","unstructured":"Teh P S, Zhang N, Teoh A B J, Chen K. A survey on touch dynamics authentication in mobile devices. Computers & Security Elsevier, 2016, 59(1): 210\u2013235","journal-title":"Computers & Security Elsevier"},{"issue":"6","key":"9134_CR49","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1002\/sec.1061","volume":"9","author":"G Kambourakis","year":"2016","unstructured":"Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E. Introducing touchstroke: keystroke-based authentication system for smart-phones. Security and Communication Networks Hindawi, 2016, 9(6): 542\u2013554","journal-title":"Security and Communication Networks Hindawi"},{"issue":"2","key":"9134_CR50","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10207-012-0161-x","volume":"12","author":"H J Asghar","year":"2013","unstructured":"Asghar H J, Li S, Pieprzyk J, Wang H. Cryptanalysis of the convex hull click human identification protocol. International Journal of Information Security Springer, 2013, 12(2): 83\u201396","journal-title":"International Journal of Information Security Springer"},{"key":"9134_CR51","doi-asserted-by":"crossref","unstructured":"Li S, Asghar H J, Pieprzyk J, Sadeghi A R, Schmitz R, Wang H. On the security of PAS (Predicate-based authentication service). In: Proceedings of the IEEE Computer Security Applications Conference. 2009, 209\u2013218","DOI":"10.1109\/ACSAC.2009.27"},{"issue":"11","key":"9134_CR52","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G. Zipf\u2019s law in passwords. IEEE Transactions on Information Forensics and Security, 2017 12(11): 2776\u20132791","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9134_CR53","doi-asserted-by":"crossref","unstructured":"Luby M, Rackoff C. A study of password security. In: Proceedings of Conference on the Theory and Application of Cryptographic Techniques. 1987, 392\u2013397","DOI":"10.1007\/3-540-48184-2_34"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-019-9134-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T07:23:37Z","timestamp":1677482617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-019-9134-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["9134"],"URL":"https:\/\/doi.org\/10.1007\/s11704-019-9134-9","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"17 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"152803"}}