{"id":"https://openalex.org/W2132115669","doi":"https://doi.org/10.1145/2523649.2523672","title":"Revisiting graphical passwords for augmenting, not replacing, text passwords","display_name":"Revisiting graphical passwords for augmenting, not replacing, text passwords","publication_year":2013,"publication_date":"2013-12-09","ids":{"openalex":"https://openalex.org/W2132115669","doi":"https://doi.org/10.1145/2523649.2523672","mag":"2132115669"},"language":"en","primary_location":{"id":"doi:10.1145/2523649.2523672","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2523649.2523672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049150241","display_name":"Murat Akpulat","orcid":"https://orcid.org/0000-0001-8469-0034"},"institutions":[{"id":"https://openalex.org/I143914637","display_name":"G\u00fcm\u00fc\u015fhane University","ror":"https://ror.org/00r9t7n55","country_code":"TR","type":"education","lineage":["https://openalex.org/I143914637"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Murat Akpulat","raw_affiliation_strings":["Gumushane University, Gumushane, Turkey"],"affiliations":[{"raw_affiliation_string":"Gumushane University, Gumushane, Turkey","institution_ids":["https://openalex.org/I143914637"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085532973","display_name":"Kemal Bi\u00e7akc\u0131","orcid":"https://orcid.org/0000-0002-2378-8027"},"institutions":[{"id":"https://openalex.org/I13236232","display_name":"TOBB University of Economics and Technology","ror":"https://ror.org/03ewx7v96","country_code":"TR","type":"education","lineage":["https://openalex.org/I13236232"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Kemal Bicakci","raw_affiliation_strings":["TOBB University of Economics and Technology, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"TOBB University of Economics and Technology, Ankara, Turkey","institution_ids":["https://openalex.org/I13236232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016733633","display_name":"Ugur Cil","orcid":null},"institutions":[{"id":"https://openalex.org/I13236232","display_name":"TOBB University of Economics and Technology","ror":"https://ror.org/03ewx7v96","country_code":"TR","type":"education","lineage":["https://openalex.org/I13236232"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ugur Cil","raw_affiliation_strings":["TOBB University of Economics and Technology, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"TOBB University of Economics and Technology, Ankara, Turkey","institution_ids":["https://openalex.org/I13236232"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049150241"],"corresponding_institution_ids":["https://openalex.org/I143914637"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.2017943,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12553","display_name":"Psychedelics and Drug Studies","score":0.9555000066757202,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9139305949211121},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.8090260624885559},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7687370777130127},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.651046633720398},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6437501907348633},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5908216238021851},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5121960043907166},{"id":"https://openalex.org/keywords/persuasion","display_name":"Persuasion","score":0.4396193027496338},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.43788525462150574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42118188738822937},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.3914441168308258},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3561292886734009},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.33605459332466125},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.0778312087059021},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07058244943618774}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9139305949211121},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.8090260624885559},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7687370777130127},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.651046633720398},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6437501907348633},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5908216238021851},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5121960043907166},{"id":"https://openalex.org/C2781310500","wikidata":"https://www.wikidata.org/wiki/Q1231428","display_name":"Persuasion","level":2,"score":0.4396193027496338},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.43788525462150574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42118188738822937},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.3914441168308258},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3561292886734009},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.33605459332466125},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0778312087059021},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07058244943618774},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2523649.2523672","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2523649.2523672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W78137777","https://openalex.org/W128619364","https://openalex.org/W140535933","https://openalex.org/W1485033854","https://openalex.org/W1529046913","https://openalex.org/W1582879267","https://openalex.org/W1921097329","https://openalex.org/W1990935444","https://openalex.org/W2000809041","https://openalex.org/W2014833947","https://openalex.org/W2030112111","https://openalex.org/W2048755632","https://openalex.org/W2054626033","https://openalex.org/W2126453598","https://openalex.org/W2163391293","https://openalex.org/W2329268478","https://openalex.org/W2343130604","https://openalex.org/W2396697587","https://openalex.org/W2618675491","https://openalex.org/W4291981231","https://openalex.org/W4298423176","https://openalex.org/W6631812630"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2359085393","https://openalex.org/W2021087413","https://openalex.org/W2936467198","https://openalex.org/W2156083280","https://openalex.org/W4214849386","https://openalex.org/W72859687","https://openalex.org/W4361801999","https://openalex.org/W2911945468","https://openalex.org/W2953105088"],"abstract_inverted_index":{"Users":[0],"generally":[1],"choose":[2],"weak":[3],"passwords":[4,19,33,50,123],"which":[5],"can":[6],"be":[7],"easily":[8],"guessed.":[9],"On":[10],"the":[11,52,75,81,85,88],"other":[12],"hand,":[13],"adoption":[14],"of":[15,111],"alternatives":[16],"to":[17,24,36,73],"text":[18,49,61,86,122],"has":[20],"been":[21],"slow":[22],"due":[23],"cost":[25],"and":[26,38,64],"usability":[27],"factors.":[28],"We":[29],"acknowledge":[30],"that":[31,116],"incumbent":[32],"remain":[34],"difficult":[35],"beat":[37],"introduce":[39],"in":[40,95],"this":[41],"study":[42,114],"Type&Click":[43],"(T&C),":[44],"a":[45,60,67],"hybrid":[46],"scheme":[47,90],"supporting":[48],"with":[51,84],"graphical":[53,96],"passwords.":[54],"In":[55],"T&C,":[56],"users":[57],"first":[58],"type":[59],"as":[62],"usual":[63],"then":[65],"make":[66],"single":[68],"click":[69],"on":[70],"an":[71],"image":[72],"complete":[74],"password":[76,97,103],"entry.":[77],"While":[78],"largely":[79],"preserving":[80],"login":[82],"experience":[83],"passwords,":[87],"new":[89],"utilizes":[91],"accumulated":[92],"scientific":[93],"knowledge":[94],"research":[98],"(implicit":[99],"feedback,":[100],"persuasion":[101],"during":[102],"creation,":[104],"leveraging":[105],"cued":[106],"recall":[107],"memory).":[108],"The":[109],"results":[110],"our":[112],"user":[113],"suggest":[115],"T&C":[117],"is":[118],"promising":[119],"for":[120,124],"augmenting":[121],"improved":[125],"security":[126],"without":[127],"degrading":[128],"usability.":[129]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
