{"id":"https://openalex.org/W2117459638","doi":"https://doi.org/10.1109/icitst.2009.5402625","title":"A rotary PIN entry scheme resilient to shoulder-surfing","display_name":"A rotary PIN entry scheme resilient to shoulder-surfing","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2117459638","doi":"https://doi.org/10.1109/icitst.2009.5402625","mag":"2117459638"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2009.5402625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110583760","display_name":"Peipei Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Peipei Shi","raw_affiliation_strings":["Concordia Institute of Information Systems Engineering, Concordia University, Montreal, QUE, Canada","[Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada]"],"affiliations":[{"raw_affiliation_string":"Concordia Institute of Information Systems Engineering, Concordia University, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"[Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada]","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006317445","display_name":"Bo Zhu","orcid":"https://orcid.org/0000-0001-7600-4583"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Bo Zhu","raw_affiliation_strings":["Concordia Institute of Information Systems Engineering, Concordia University, Montreal, QUE, Canada","[Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada]"],"affiliations":[{"raw_affiliation_string":"Concordia Institute of Information Systems Engineering, Concordia University, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"[Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada]","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"A. Youssef","raw_affiliation_strings":["Concordia Institute of Information Systems Engineering, Concordia University, Montreal, QUE, Canada","[Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada]"],"affiliations":[{"raw_affiliation_string":"Concordia Institute of Information Systems Engineering, Concordia University, Montreal, QUE, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"[Concordia Institute for Information Systems Engineering, Concordia University, Montr\u00e9al, QC, Canada]","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110583760"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":2.2209,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.9139191,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7079147100448608},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7042855024337769},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6997721791267395},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6874697804450989},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6447949409484863},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5188590288162231},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.507424533367157},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5065194368362427},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2068016231060028}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7079147100448608},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7042855024337769},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6997721791267395},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6874697804450989},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6447949409484863},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5188590288162231},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.507424533367157},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5065194368362427},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2068016231060028},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2009.5402625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402625","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1971300091","https://openalex.org/W1984314602","https://openalex.org/W2019017059","https://openalex.org/W2078483465","https://openalex.org/W2123776321","https://openalex.org/W2157007820","https://openalex.org/W2166689265"],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W1576092969","https://openalex.org/W2898483019","https://openalex.org/W2242172122"],"abstract_inverted_index":{"The":[0],"combination":[1],"of":[2,26,64,127],"tokens":[3,40],"or":[4,41,46,60],"cards":[5,42],"and":[6,24,135],"personal":[7],"identification":[8],"numbers":[9],"(PINs)":[10],"are":[11],"widely":[12],"used":[13],"for":[14,114],"authentication":[15,39,71],"in":[16],"many":[17],"applications":[18],"including":[19],"automatic":[20],"teller":[21],"machines":[22],"(ATMs)":[23],"point":[25],"sales":[27],"(POSs).":[28],"Recent":[29],"security":[30,84,134],"incidents":[31],"have":[32],"shown":[33],"that":[34],"criminals":[35,73],"can":[36,74,107],"get":[37],"these":[38],"either":[43],"by":[44,61],"pickpocketing":[45],"through":[47,58],"fake":[48],"magnetic":[49],"card":[50],"readers.":[51],"Furthermore,":[52],"PINs":[53],"may":[54],"also":[55],"be":[56],"captured":[57],"shoulder-surfing":[59,101],"the":[62,105,109],"use":[63],"concealed":[65],"miniature":[66],"cameras.":[67],"Upon":[68],"obtaining":[69],"both":[70,126],"factors,":[72],"easily":[75],"break":[76],"into":[77],"users'":[78],"accounts":[79],"which":[80,97,128],"presents":[81],"a":[82,91,118,130],"high":[83],"risk.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"propose":[90],"new":[92],"spinwheel-like":[93],"PIN":[94,111],"entry":[95,112],"scheme":[96,122],"is":[98],"resilient":[99],"against":[100],"attacks":[102],"even":[103],"if":[104],"shoulder-surfer":[106],"record":[108],"entire":[110],"procedure":[113],"one":[115],"time":[116],"with":[117],"video":[119],"device.":[120],"This":[121],"has":[123],"two":[124],"variants,":[125],"achieve":[129],"good":[131],"balance":[132],"between":[133],"usability.":[136]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
