{"created":"2023-05-15T10:00:49.302721+00:00","id":5241,"links":{},"metadata":{"_buckets":{"deposit":"7a90cadc-6a08-4e27-915a-a9a920369dd2"},"_deposit":{"created_by":5,"id":"5241","owner":"5","owners":[5],"pid":{"revision_id":0,"type":"depid","value":"5241"},"status":"published"},"_oai":{"id":"oai:miyazaki-u.repo.nii.ac.jp:00005241","sets":["73","73:36","73:36:330","73:36:330:327"]},"author_link":["11839","14888","25736","28400"],"item_10002_alternative_title_1":{"attribute_name":"その他(別言語等)のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"ロクガ ガゾウ オ モチイ タ コウゲキ ニ タイセイ オ ジ ツ パズル カタ ニンショウ ホウシキ ノ テイアン"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2017-07-31","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"268","bibliographicPageStart":"263","bibliographicVolumeNumber":"46","bibliographic_titles":[{"bibliographic_title":"宮崎大学工学部紀要","bibliographic_titleLang":"ja"},{"bibliographic_title":"Memoirs of Faculty of Engineering, University of Miyazaki","bibliographic_titleLang":"en"}]}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Currently, user authentication methods such as PINs, passwords and so on, are used to protect important and private data in mobile devices. However, those existing methods are not sufficiently safe against shoulder surfing attacks. Attackers can easily steal PIN codes or passwords. To prevent such attacks, the puzzle authentication method was proposed. In the method, users unlock their devices thorough solving a “puzzle.\" A user drags an orb to adjacent positions, and the dragged orb swaps places with the orb already there. The authentication will succeed when all of the orbs corresponding to characters of the password are put into the designated positions. The special feature of this method is that users have fun while they unlock their devices. However, it was also known that the method has several drawbacks. First, the method is not strong enough against brute-force attacks. Next, the correct answer is easily revealed by shooting the authenticated screen using a video camera. In this study, several improvements were made to the method to overcome brute-force attacks and video recording attacks. The improved authentication method was implemented and experiments for evaluation were carried out.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"宮崎大学工学部","subitem_publisher_language":"ja"},{"subitem_publisher":"Faculty of Engineering, University of Miyazaki","subitem_publisher_language":"en"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00732558","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"05404924","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"日隈, 光基","creatorNameLang":"ja"},{"creatorName":"ヒノクマ, コウキ","creatorNameLang":"ja-Kana"},{"creatorName":"Hinokuma, Koki","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Yamaba, Hisaaki","creatorNameLang":"en"},{"creatorName":"山場, 久昭","creatorNameLang":"ja"},{"creatorName":"ヤマバ, ヒサアキ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"久保田, 真一郎","creatorNameLang":"ja"},{"creatorName":"クボタ, シンイチロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Kubota, Shin-Ichiro","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"Okazaki, Naonobu","creatorNameLang":"en"},{"creatorName":"岡崎, 直宣","creatorNameLang":"ja"},{"creatorName":"オカザキ, ナオノブ","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"日隈, 光基","creatorNameLang":"ja"},{"creatorName":"ヒノクマ, コウキ","creatorNameLang":"ja-Kana"},{"creatorName":"Hinokuma, Koki","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"久保田, 真一郎","creatorNameLang":"ja"},{"creatorName":"クボタ, シンイチロウ","creatorNameLang":"ja-Kana"},{"creatorName":"Kubota, Shin-Ichiro","creatorNameLang":"en"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-06-21"}],"displaytype":"detail","filename":"p263.pdf","filesize":[{"value":"1.3 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文","url":"https://miyazaki-u.repo.nii.ac.jp/record/5241/files/p263.pdf"},"version_id":"e69a2bbf-d764-4c6a-9e1f-3dbbba38cb06"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"mobile security, shoulder-surfing, puzzle","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"録画画像を用いた攻撃に耐性を持つパズル型認証方式の提案","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"録画画像を用いた攻撃に耐性を持つパズル型認証方式の提案","subitem_title_language":"ja"},{"subitem_title":"Proposal of Puzzle Authentication Method with Video Recording Attack Resistance","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"5","path":["73","36","330","327"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-06-21"},"publish_date":"2020-06-21","publish_status":"0","recid":"5241","relation_version_is_last":true,"title":["録画画像を用いた攻撃に耐性を持つパズル型認証方式の提案"],"weko_creator_id":"5","weko_shared_id":2},"updated":"2023-11-07T02:41:07.260148+00:00"}