{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:44:27Z","timestamp":1726760667004},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100005605","name":"University Malaysia Pahang","doi-asserted-by":"publisher","award":["RDU160353"],"id":[{"id":"10.13039\/501100005605","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1016\/j.compeleceng.2016.12.007","type":"journal-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T22:01:59Z","timestamp":1481666519000},"page":"99-109","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["VAP code: A secure graphical password for smart devices"],"prefix":"10.1016","volume":"59","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6234-7267","authenticated-orcid":false,"given":"Saiful","family":"Azad","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2774-9076","authenticated-orcid":false,"given":"Musfiq","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"M. S. A. Noman","family":"Ranak","sequence":"additional","affiliation":[]},{"given":"B. M. F. Kamal","family":"Ruhee","sequence":"additional","affiliation":[]},{"given":"N. Nourin","family":"Nisa","sequence":"additional","affiliation":[]},{"given":"Nazrul","family":"Kabir","sequence":"additional","affiliation":[]},{"given":"Arafatur","family":"Rahman","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2072-1510","authenticated-orcid":false,"given":"Jasni","family":"Mohamad Zain","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2016.12.007_bib0001","unstructured":"Herb Weisbaum, Most Americans don\u2019t secure their smartphones. April 26, 2014, url: http:\/\/www.cnbc.com\/2014\/04\/26\/most-americans-dont-secure-their-smartphones.html."},{"issue":"7","key":"10.1016\/j.compeleceng.2016.12.007_bib0002","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","article-title":"Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks","volume":"10","author":"Xiong","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"10.1016\/j.compeleceng.2016.12.007_bib0003","doi-asserted-by":"crossref","first-page":"2327","DOI":"10.1109\/TIFS.2014.2363553","article-title":"Cost-effective scalable and anonymous certificateless remote authentication protocol","volume":"9","author":"Xiong","year":"2014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"10.1016\/j.compeleceng.2016.12.007_bib0004","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","article-title":"Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy","volume":"83","author":"Jiang","year":"2016","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"10.1016\/j.compeleceng.2016.12.007_bib0005","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1002\/dac.2644","article-title":"Improvement of robust smart-card-based password authentication scheme","volume":"28","author":"Jiang","year":"2015","journal-title":"Int J Commun Syst"},{"key":"10.1016\/j.compeleceng.2016.12.007_sbref0005","series-title":"Proceedings of modern AI and cognitive science conference (MAICS)","article-title":"A comparative study of graphical and alphanumeric passwords for mobile device authentication","author":"Anwar","year":"2015"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0007","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2013.02.004","article-title":"Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys","volume":"235","author":"Xiong","year":"2013","journal-title":"Inf Sci"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0008","series-title":"Proceedings of the international multiconference on computer science and information technology","first-page":"847","article-title":"Social engineering-based attacks: model and NewZaland perspective","author":"Janczewski","year":"2010"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0009","unstructured":"Michael Cooney, 10 common mobile security problems to attack. PC World, url: http:\/\/www.pcworld.com\/article\/2010278\/10-common-mobile-security-problems-to-attack.html."},{"key":"10.1016\/j.compeleceng.2016.12.007_sbref0008","series-title":"Security and usability","first-page":"147","article-title":"Graphical passwords","author":"Monrose","year":"2005"},{"issue":"4","key":"10.1016\/j.compeleceng.2016.12.007_bib0011","doi-asserted-by":"crossref","DOI":"10.1145\/2333112.2333114","article-title":"Graphical passwords: learning from the first twelve years","volume":"44","author":"Biddle","year":"2012","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0012","series-title":"Proceedings of the USENIX 4th workshop on offensive technologies","article-title":"Smudge attacks on smartphone touch screens","author":"Aviv","year":"2010"},{"issue":"1","key":"10.1016\/j.compeleceng.2016.12.007_bib0013","article-title":"Secure authentication by graphical password","volume":"2","author":"Swapnil","year":"2013","journal-title":"Int J Adv ElectrElectron Eng"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0014","series-title":"Proceedings of the international working conference on advanced visual interfaces (AVI)","article-title":"Design and evaluation of a shoulder-surfing resistant graphical password scheme","author":"Wiedenbeck","year":"2006"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0015","unstructured":"Passfaces Corporation. Passfaces: two factor authentication for the enterprise. Url: http:\/\/www.realuser.com\/, last accessed in June 2015."},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0016","unstructured":"Sun H.M., Chen S.T., Yeh J.H., Cheng C.Y.. A shoulder surfing resistant graphical authentication system. IEEE Trans Dependable Secure ComputUrl: http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=7429722, [in press]."},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0017","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.procs.2015.03.084","article-title":"Shoulder-surfing registant graphical password system","volume":"45","author":"Shah","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0018","series-title":"Proceedings of the 8th USENIX security symposium","article-title":"The design and analysis of graphical passwords","author":"Jermyn","year":"1999"},{"issue":"6","key":"10.1016\/j.compeleceng.2016.12.007_bib0019","first-page":"943","article-title":"The design and implementation of background pass-go scheme towards security threats","volume":"5","author":"Por","year":"2008","journal-title":"WSEAS Trans Inf Sci Appl"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0020","unstructured":"Android open source project, \u201cAuthentication,\u201d August 11, 2016, url: https:\/\/source.android.com\/security\/authentication."},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0021","series-title":"Proceedings of the 28th ACM conference on human factors in computing systems (CHI)","first-page":"1093","article-title":"Multi-touch authentication on tabletops","author":"Kim","year":"2010"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0022","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.cose.2013.12.001","article-title":"Tinylock: affordable defense against smudge attacks on smartphone pattern lock systems","volume":"42","author":"Kwon","year":"2014","journal-title":"Comput Secur"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0023","unstructured":"Blonder G.. Graphical passwords. 1996. U.S. Patent 5,559,961."},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0024","unstructured":"\u201cPasslogix,\u201d url: http:\/\/www.oracle.com\/us\/corporate\/Acquisitions\/passlogix\/index.html, last accessed in June 2015."},{"issue":"3","key":"10.1016\/j.compeleceng.2016.12.007_bib0025","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/TIFS.2010.2053706","article-title":"Purely automated attacks on passpoints-style graphical passwords","volume":"5","author":"van Oorschot","year":"2010","journal-title":"IEEE Trans Info Forensics Secur"},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0026","unstructured":"LG, \u201cKnock Code,\u201d url: http:\/\/www.lg.com\/ae\/lgknockcode\/index.m, last access in January 2015."},{"key":"10.1016\/j.compeleceng.2016.12.007_bib0027","series-title":"Proceedings of the SIGCHI conference on human factors in computing systems (CHI\u201909)","first-page":"913","article-title":"Vibrapass: secure authentication based on shared lies","author":"Luca","year":"2009"}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790616310242?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790616310242?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T12:57:43Z","timestamp":1575550663000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790616310242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":27,"alternative-id":["S0045790616310242"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2016.12.007","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2017,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"VAP code: A secure graphical password for smart devices","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2016.12.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}