Quantifying the security of graphical passwords: the case of android unlock patterns. Uellenbeck, S., Dürmuth, M., Wolf, C., & Holz, T. In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, pages 161--172, 2013. Paper doi bibtex @inproceedings{DBLP:conf/ccs/UellenbeckDWH13,
author = {Sebastian Uellenbeck and
Markus D{\"{u}}rmuth and
Christopher Wolf and
Thorsten Holz},
title = {Quantifying the security of graphical passwords: the case of android
unlock patterns},
booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
CCS'13, Berlin, Germany, November 4-8, 2013},
pages = {161--172},
year = {2013},
crossref = {DBLP:conf/ccs/2013},
url = {http://doi.acm.org/10.1145/2508859.2516700},
doi = {10.1145/2508859.2516700},
timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
biburl = {http://dblp.org/rec/bib/conf/ccs/UellenbeckDWH13},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"uX7t9aGyc6gqANzKb","bibbaseid":"uellenbeck-drmuth-wolf-holz-quantifyingthesecurityofgraphicalpasswordsthecaseofandroidunlockpatterns-2013","downloads":0,"creationDate":"2017-09-27T10:54:12.913Z","title":"Quantifying the security of graphical passwords: the case of android unlock patterns","author_short":["Uellenbeck, S.","Dürmuth, M.","Wolf, C.","Holz, T."],"year":2013,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Holz:Thorsten","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Sebastian"],"propositions":[],"lastnames":["Uellenbeck"],"suffixes":[]},{"firstnames":["Markus"],"propositions":[],"lastnames":["Dürmuth"],"suffixes":[]},{"firstnames":["Christopher"],"propositions":[],"lastnames":["Wolf"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]}],"title":"Quantifying the security of graphical passwords: the case of android unlock patterns","booktitle":"2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013","pages":"161--172","year":"2013","crossref":"DBLP:conf/ccs/2013","url":"http://doi.acm.org/10.1145/2508859.2516700","doi":"10.1145/2508859.2516700","timestamp":"Fri, 08 Nov 2013 09:43:20 +0100","biburl":"http://dblp.org/rec/bib/conf/ccs/UellenbeckDWH13","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/ccs/UellenbeckDWH13,\n author = {Sebastian Uellenbeck and\n Markus D{\\\"{u}}rmuth and\n Christopher Wolf and\n Thorsten Holz},\n title = {Quantifying the security of graphical passwords: the case of android\n unlock patterns},\n booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,\n CCS'13, Berlin, Germany, November 4-8, 2013},\n pages = {161--172},\n year = {2013},\n crossref = {DBLP:conf/ccs/2013},\n url = {http://doi.acm.org/10.1145/2508859.2516700},\n doi = {10.1145/2508859.2516700},\n timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},\n biburl = {http://dblp.org/rec/bib/conf/ccs/UellenbeckDWH13},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Uellenbeck, S.","Dürmuth, M.","Wolf, C.","Holz, T."],"key":"DBLP:conf/ccs/UellenbeckDWH13","id":"DBLP:conf/ccs/UellenbeckDWH13","bibbaseid":"uellenbeck-drmuth-wolf-holz-quantifyingthesecurityofgraphicalpasswordsthecaseofandroidunlockpatterns-2013","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/2508859.2516700"},"downloads":0},"search_terms":["quantifying","security","graphical","passwords","case","android","unlock","patterns","uellenbeck","dürmuth","wolf","holz"],"keywords":[],"authorIDs":[],"dataSources":["nsffQ5pYkGG38Yzs3"]}