{"id":"https://openalex.org/W2039163404","doi":"https://doi.org/10.1145/2414536.2414584","title":"WYSWYE","display_name":"WYSWYE","publication_year":2012,"publication_date":"2012-11-26","ids":{"openalex":"https://openalex.org/W2039163404","doi":"https://doi.org/10.1145/2414536.2414584","mag":"2039163404"},"language":"en","primary_location":{"id":"doi:10.1145/2414536.2414584","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2414536.2414584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Australian Computer-Human Interaction Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038523801","display_name":"Rohit Ashok Khot","orcid":"https://orcid.org/0000-0002-1447-8625"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]},{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rohit Ashok Khot","raw_affiliation_strings":["IIIT-Delhi, Delhi, India"],"affiliations":[{"raw_affiliation_string":"IIIT-Delhi, Delhi, India","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077509916","display_name":"Ponnurangam Kumaraguru","orcid":"https://orcid.org/0000-0001-5082-2078"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]},{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ponnurangam Kumaraguru","raw_affiliation_strings":["IIIT-Delhi, Delhi, India"],"affiliations":[{"raw_affiliation_string":"IIIT-Delhi, Delhi, India","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070586393","display_name":"Kannan Srinathan","orcid":"https://orcid.org/0009-0002-4306-6707"},"institutions":[{"id":"https://openalex.org/I65181880","display_name":"Indian Institute of Technology Hyderabad","ror":"https://ror.org/01j4v3x97","country_code":"IN","type":"education","lineage":["https://openalex.org/I65181880"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kannan Srinathan","raw_affiliation_strings":["IIIT-Hyderabad, Hyderabad, India","IIIT - Hyderabad, Hyderabad, India#TAB#"],"affiliations":[{"raw_affiliation_string":"IIIT-Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I65181880"]},{"raw_affiliation_string":"IIIT - Hyderabad, Hyderabad, India#TAB#","institution_ids":["https://openalex.org/I65181880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038523801"],"corresponding_institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"],"apc_list":null,"apc_paid":null,"fwci":7.4376,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.9680558,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"285","last_page":"294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8966095447540283},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.8480267524719238},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7758855223655701},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.685862123966217},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6247148513793945},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4847280979156494},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4662429690361023},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.43525347113609314},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.40340641140937805}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8966095447540283},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.8480267524719238},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7758855223655701},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.685862123966217},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6247148513793945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4847280979156494},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4662429690361023},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.43525347113609314},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.40340641140937805},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2414536.2414584","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2414536.2414584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Australian Computer-Human Interaction Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W60907133","https://openalex.org/W652269645","https://openalex.org/W1482972535","https://openalex.org/W1485033854","https://openalex.org/W1492832934","https://openalex.org/W1498607839","https://openalex.org/W1980015812","https://openalex.org/W1982270377","https://openalex.org/W1982771491","https://openalex.org/W1987485968","https://openalex.org/W2012965406","https://openalex.org/W2019017059","https://openalex.org/W2028849308","https://openalex.org/W2031362864","https://openalex.org/W2040686253","https://openalex.org/W2046378201","https://openalex.org/W2046616910","https://openalex.org/W2078483465","https://openalex.org/W2108525321","https://openalex.org/W2115034095","https://openalex.org/W2115218409","https://openalex.org/W2126453598","https://openalex.org/W2139094422","https://openalex.org/W2150639461","https://openalex.org/W2153305919","https://openalex.org/W2160828020","https://openalex.org/W2169555690","https://openalex.org/W2396697587","https://openalex.org/W3168285349","https://openalex.org/W6621462857","https://openalex.org/W6628932435"],"related_works":["https://openalex.org/W4235220108","https://openalex.org/W4256170434","https://openalex.org/W4233948907","https://openalex.org/W4315650027","https://openalex.org/W4238894392","https://openalex.org/W2357607877","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W4311722428","https://openalex.org/W4252054168"],"abstract_inverted_index":{"Recognition":[0],"based":[1,32,38,149],"graphical":[2,33,150],"passwords":[3,185],"are":[4,37],"inherently":[5],"vulnerable":[6],"to":[7,75,107,128,176],"shoulder":[8,143],"surfing":[9,144],"attacks":[10],"because":[11],"of":[12,16,55,62,81,102,160,179],"their":[13,111],"visual":[14],"mode":[15],"interaction.":[17],"In":[18,134],"this":[19],"paper,":[20],"we":[21],"propose":[22],"and":[23,64,79,125,171,186],"evaluate":[24,76],"two":[25],"novel":[26],"shoulder-surfing":[27],"defense":[28],"techniques":[29,36],"for":[30],"recognition":[31,148],"passwords.":[34,151],"These":[35],"on":[39,106],"WYSWYE":[40,166],"(Where":[41],"You":[42,46],"See":[43],"is":[44],"What":[45],"Enter)":[47],"strategy,":[48],"where":[49],"the":[50,77,82,86,108,116,123,137,161],"user":[51],"identifies":[52],"a":[53,59],"pattern":[54],"password":[56],"images":[57,63],"within":[58],"presented":[60],"grid":[61],"replicates":[65],"it":[66,130],"onto":[67],"another":[68],"grid.":[69],"We":[70,164],"conducted":[71],"controlled":[72],"laboratory":[73],"experiments":[74],"usability":[78],"security":[80],"proposed":[83,162],"techniques.":[84],"Both":[85],"schemes":[87,124,138],"had":[88],"high":[89],"login":[90,153],"success":[91],"rates":[92],"with":[93,122,156],"no":[94],"failures":[95],"in":[96,110,114,131,158],"authentication.":[97],"More":[98],"than":[99,145],"seventy":[100],"percent":[101],"participants":[103,119],"successfully":[104],"logged":[105],"system":[109],"first":[112],"attempt":[113],"both":[115,136],"schemes.":[117],"The":[118,152],"were":[120,126,139],"satisfied":[121],"willing":[127],"use":[129],"public":[132],"places.":[133],"addition,":[135],"significantly":[140],"secure":[141],"against":[142],"normal":[146],"unprotected":[147],"efficiency":[154],"improved":[155],"practice":[157],"one":[159],"scheme.":[163],"believe,":[165],"strategy":[167],"has":[168],"considerable":[169],"potential":[170],"can":[172],"easily":[173],"be":[174],"extended":[175],"other":[177],"types":[178],"authentication":[180],"systems":[181],"such":[182],"as":[183],"text":[184],"PINS.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2016-06-24T00:00:00"}
