{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:28:34Z","timestamp":1769117314744,"version":"3.49.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_13","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"138-148","source":"Crossref","is-referenced-by-count":2,"title":["Do Graphical Authentication Systems Solve the Password Memorability Problem?"],"prefix":"10.1007","author":[{"given":"Soumyadeb","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Ron","family":"Poet","sequence":"additional","affiliation":[]},{"given":"Lewis","family":"Mackenzie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM, 40\u201346 (CACM December 1999)","DOI":"10.1145\/322796.322806"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of International Conference on World Wide Web (WWW 2007), pp. 657\u2013666 (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Stobert, E., Oorschot, P.C.: Van, and Biddle, R. Multiple Password Interference in Text and Click-Based Graphical Passwords. In: Proc. of CCS, pp. 500\u2013511 (2009)","DOI":"10.1145\/1653662.1653722"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-642-40477-1_26","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"S. Chowdhury","year":"2013","unstructured":"Chowdhury, S., Poet, R., Mackenzie, L.: A comprehensive study of the usability of multiple graphical passwords. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013, Part III. LNCS, vol.\u00a08119, pp. 424\u2013441. Springer, Heidelberg (2013)"},{"key":"13_CR5","volume-title":"Proc. of the 13th conference on USENIX Security Symposium","author":"D. Davis","year":"2004","unstructured":"Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: Proc. of the 13th conference on USENIX Security Symposium, vol.\u00a013, USENIX Association Berkeley, CA (2004)"},{"key":"13_CR6","unstructured":"Dhamija, R., Perrig, A.: Deja vu: A user study using images for authentication. In: Proc. USENIX Security Symposium, pp. 45\u201348 (2000)"},{"key":"13_CR7","first-page":"889","volume-title":"Proc. of CHI","author":"K.M. Everitt","year":"2009","unstructured":"Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proc. of CHI, pp. 889\u2013898. ACM, New York (2009)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Moncur, W., LePl\u00e2tre, G.: Pictures at the ATM - Exploring the usability of multiple graphical passwords. In: Proc. of CHI, pp. 887\u2013894 (2007)","DOI":"10.1145\/1240624.1240758"},{"key":"13_CR9","unstructured":"Renaud, K.: Web authentication using Mikon images. In: World Congress on Privacy, Security, Trust and the Management of E-Business, pp. 1-10"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvlc.2008.04.001","volume":"92","author":"K. Renaud","year":"2009","unstructured":"Renaud, K.: On user involvement in production of images used in visual authentication. Journal of Visual Languages and Computing\u00a092, 1\u201315 (2009)","journal-title":"Journal of Visual Languages and Computing"},{"key":"13_CR11","unstructured":"Tao, H.: Pass-Go, a new graphical password scheme. M.S. thesis, School of Information Technology and Engineering, University of Ottawa (2006)"},{"key":"13_CR12","unstructured":"Madigan, S.: Picture Memory. In: Yuille, J. (ed.) Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. Lawrence Erlbaum Associates, Hillsdale (1983)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0022-5371(66)80048-8","volume":"5","author":"E. Tulving","year":"1966","unstructured":"Tulving, E., Pearlstone, Z.: Availaibility Versus Accessibility of Information in Memory for Words. Journal of Verbal Learning and Verbal Behaviour\u00a05, 381\u2013391 (1966)","journal-title":"Journal of Verbal Learning and Verbal Behaviour"},{"key":"13_CR14","volume-title":"Human Memory:Theory and Practice","author":"A. Baddeley","year":"1997","unstructured":"Baddeley, A.: Human Memory:Theory and Practice. Psychology Press, Hove (1997)"},{"key":"13_CR15","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The Design and Analysis of Graphical Passwords. In: Proceedings of 8th USENIX Security Symposium (1999)"},{"issue":"2","key":"13_CR16","doi-asserted-by":"publisher","first-page":"202","DOI":"10.3758\/BF03200774","volume":"1","author":"M. Wolfe","year":"1994","unstructured":"Wolfe, M.: Guided Search 2.0 A Revised Model of Visual Search. Psychonomic Bulletin & Review\u00a01(2), 202\u2013238 (1994)","journal-title":"Psychonomic Bulletin & Review"},{"key":"13_CR17","unstructured":"Szekely, A., Bates, E.: Objective Visual Complexity as a Variable in Picture Naming. In: CRL Newsletter Center for Research in Language, University of California, pp. 3\u201333 (2000)"},{"key":"13_CR18","first-page":"66","volume":"12","author":"T. Mantyla","year":"1986","unstructured":"Mantyla, T.: Optimising cue effectiveness. Journal of Experimental Psychology: Learning Memory and Cognition\u00a012, 66\u201371 (1986)","journal-title":"Journal of Experimental Psychology: Learning Memory and Cognition"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Mathur, P.N.: Barriers to effective visual communication, 3rd edn. Media Asia (1978)","DOI":"10.1080\/01296612.1978.11725943"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Sturken, M., Cartwright, L.: Practices of Looking: An introduction to visual culture. Oxford Press (2012)","DOI":"10.1093\/gao\/9781884446054.article.T2093950"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:13:25Z","timestamp":1582413205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}