{"id":"https://openalex.org/W1997974330","doi":"https://doi.org/10.1145/2660267.2662379","title":"POSTER","display_name":"POSTER","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W1997974330","doi":"https://doi.org/10.1145/2660267.2662379","mag":"1997974330"},"language":"en","primary_location":{"id":"doi:10.1145/2660267.2662379","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2662379","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015211192","display_name":"Xiangxue Li","orcid":"https://orcid.org/0000-0002-1779-6178"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangxue Li","raw_affiliation_strings":["East China Normal University, Shanghai, China","East China Normal University, SHANGHAI, China"],"affiliations":[{"raw_affiliation_string":"East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]},{"raw_affiliation_string":"East China Normal University, SHANGHAI, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417226","display_name":"Yu Yu","orcid":"https://orcid.org/0000-0002-9278-4521"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Yu","raw_affiliation_strings":["Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100720766","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0001-9344-6682"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Li","raw_affiliation_strings":["Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071189955","display_name":"Haifeng Qian","orcid":"https://orcid.org/0000-0003-4920-5405"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haifeng Qian","raw_affiliation_strings":["East China Normal University, Shanghai, China","East China Normal University, SHANGHAI, China"],"affiliations":[{"raw_affiliation_string":"East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]},{"raw_affiliation_string":"East China Normal University, SHANGHAI, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049853160","display_name":"Yuan Zhou","orcid":"https://orcid.org/0000-0002-9198-6586"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhou","raw_affiliation_strings":["Network Emergency Response Technical Team/Coordination Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Emergency Response Technical Team/Coordination Center, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["Jinan University, Guangzhou, China","Jinan University,Guangzhou, China,"],"affiliations":[{"raw_affiliation_string":"Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Jinan University,Guangzhou, China,","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5015211192"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15338335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1460","last_page":"1462"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11707","display_name":"Gaze Tracking and Assistive Technology","score":0.9373000264167786,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8047006130218506},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7935053110122681},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6088325381278992},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5005967617034912},{"id":"https://openalex.org/keywords/confusion","display_name":"Confusion","score":0.4563402235507965},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.45461946725845337},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.44129300117492676},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.426676869392395},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.39706823229789734},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3702870011329651},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3610936403274536},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.18759748339653015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16262701153755188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8047006130218506},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7935053110122681},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6088325381278992},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5005967617034912},{"id":"https://openalex.org/C2781140086","wikidata":"https://www.wikidata.org/wiki/Q557945","display_name":"Confusion","level":2,"score":0.4563402235507965},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.45461946725845337},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.44129300117492676},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.426676869392395},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.39706823229789734},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3702870011329651},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3610936403274536},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.18759748339653015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16262701153755188},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2660267.2662379","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2662379","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/4"}],"awards":[{"id":"https://openalex.org/G1732616428","display_name":null,"funder_award_id":"13JC1403500","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G7031603968","display_name":null,"funder_award_id":"61133014 61172085 61272536 61103221 61272037 and 61472249","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8006165375","display_name":null,"funder_award_id":"2013CB338004","funder_id":"https://openalex.org/F4320321540","funder_display_name":"Ministry of Science and Technology of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321540","display_name":"Ministry of Science and Technology of the People's Republic of China","ror":"https://ror.org/027s68j25"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W100055053","https://openalex.org/W128619364","https://openalex.org/W1503108337","https://openalex.org/W1921097329","https://openalex.org/W2028828496","https://openalex.org/W2079145130","https://openalex.org/W6640284056"],"related_works":["https://openalex.org/W2115218409","https://openalex.org/W2183044514","https://openalex.org/W165936246","https://openalex.org/W2090949570","https://openalex.org/W2596869006","https://openalex.org/W2417837167","https://openalex.org/W2969720675","https://openalex.org/W181832734","https://openalex.org/W2085528593","https://openalex.org/W2181639618"],"abstract_inverted_index":{"Graphical":[0],"password":[1],"methods":[2,154],"rely":[3],"on":[4],"human":[5],"experience":[6,84],"and":[7,17,59,98,145,167],"hand":[8,86],"selection":[9,87],"(not":[10],"well-quantified":[11],"metric)":[12],"to":[13,29,42,55,122,179,196],"evaluate":[14],"the":[15,18,21,37,72,75,77,111,134,176,180,184,188,191,194],"appropriateness":[16],"confusion":[19],"of":[20,71,95,113,126,137,165,175,200],"challenge":[22,189,198],"images.":[23],"In":[24],"this":[25],"paper":[26],"we":[27],"propose":[28],"use":[30],"for":[31,35,155],"authentication":[32,153],"Chinese":[33],"characters,":[34,190],"which":[36],"entropy":[38],"can":[39,100,148],"be":[40,101,149],"up":[41],"9.65":[43],"(much":[44],"larger":[45],"than":[46],"other":[47],"languages).":[48],"We":[49,160],"first":[50],"show":[51],"an":[52,62,130],"algorithmic":[53],"framework":[54,73,118,144,186],"authenticate":[56],"a":[57,67,172],"user":[58,163],"then":[60],"present":[61,139],"empirical":[63],"analysis":[64],"conducted":[65],"at":[66],"university.":[68],"The":[69],"advantages":[70],"include":[74],"following:":[76],"storage":[78],"overhead":[79],"is":[80,88,91,119,171],"low;":[81],"no":[82,92],"personal":[83],"or":[85],"involved;":[89],"there":[90,170],"predefined":[93],"dictionary":[94],"likely":[96],"choices;":[97],"it":[99],"easily":[102],"referenced":[103],"by":[104],"personal-style":[105],"cues.":[106],"Our":[107,143],"study":[108],"shows":[109],"that":[110,115,123,133,169],"number":[112],"participants":[114,138],"prefer":[116],"our":[117],"much":[120],"close":[121],"in":[124],"favor":[125],"graphical":[127,146],"passwords,":[128],"with":[129,157],"interesting":[131],"outcome":[132],"two":[135],"groups":[136],"significantly":[140],"distinct":[141],"backgrounds.":[142,159],"passwords":[147],"used":[150],"as":[151],"candidate":[152],"users":[156,192],"different":[158],"also":[161],"measure":[162],"choices":[164],"patterns":[166],"find":[168],"slight":[173],"preference":[174],"3$\\times$3":[177],"grid":[178],"circle":[181],"patterns.":[182],"While":[183],"proposed":[185],"prescribes":[187],"have":[193],"option":[195],"define":[197],"characters":[199],"their":[201],"own.":[202]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
