{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:02Z","timestamp":1742912702525,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_17","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"172-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Bootstrapping Adoption of the Pico Password Replacement System"],"prefix":"10.1007","author":[{"given":"Frank","family":"Stajano","sequence":"first","affiliation":[]},{"given":"Graeme","family":"Jenkinson","sequence":"additional","affiliation":[]},{"given":"Jeunese","family":"Payne","sequence":"additional","affiliation":[]},{"given":"Max","family":"Spencer","sequence":"additional","affiliation":[]},{"given":"Quentin","family":"Stafford-Fraser","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Warrington","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"issue":"12","key":"17_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM 42(12), 40\u201346 (1999). http:\/\/doi.acm.org\/10.1145\/322796.322806","journal-title":"Communications of the ACM"},{"key":"17_CR2","unstructured":"Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge, May 2012. http:\/\/www.jbonneau.com\/doc\/2012-jbonneau-phd_thesis.pdf"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP \u201912, pp. 553\u2013567. IEEE Computer Society, Washington (2012). http:\/\/dx.doi.org\/10.1109\/SP.2012.44","DOI":"10.1109\/SP.2012.44"},{"key":"17_CR4","unstructured":"Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS 2010 (2010)"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM \u201905, pp. 67\u201373. IEEE Computer Society, Washington (2005). http:\/\/dx.doi.org\/10.1109\/SECURECOMM.2005.56","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"17_CR7","unstructured":"ISO: Information technology\u2013automatic identification and data capture techniques\u2013QR Code 2005 bar code symbology specification. ISO 18004:2006, International Organization for Standardization, Geneva, Switzerland (2006)"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u2018SIGn-and-MAc\u2019 approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003)"},{"key":"17_CR9","unstructured":"Laurie, B., Singer, A.: Choose the red pill and the blue pill: a position paper. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW \u201908, pp. 127\u2013133. ACM, New York (2008). http:\/\/doi.acm.org\/10.1145\/1595676.1595695"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"MA Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the \u2018weakest link\u2019 - a human\/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122\u2013131 (2001). http:\/\/dx.doi.org\/10.1023\/A:1011902718709","journal-title":"BT Technol. J."},{"key":"17_CR11","series-title":"LNCS","first-page":"49","volume-title":"Security Protocols 2011","author":"F Stajano","year":"2011","unstructured":"Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49\u201381. Springer, Heidelberg (2011)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-35694-0_24","volume-title":"Security Protocols XX","author":"O Stannard","year":"2012","unstructured":"Stannard, O., Stajano, F.: Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2012. LNCS, vol. 7622, pp. 223\u2013230. Springer, Heidelberg (2012). http:\/\/dx.doi.org\/10.1007\/978-3-642-35694-0_24"},{"issue":"3","key":"17_CR13","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003). http:\/\/dl.acm.org\/citation.cfm?id=2017197.2017202","journal-title":"MIS Q."},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-540-77156-2_14","volume-title":"Security\u00a0Protocols","author":"F-L Wong","year":"2007","unstructured":"Wong, F.-L., Stajano, F.: Multi-channel protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 112\u2013127. Springer, Heidelberg (2007). http:\/\/www.cl.cam.ac.uk\/fms27\/papers\/2005-WongSta-multichannel.pdf, updated version in IEEE Pervasive Computing 6(4), 31\u201339 (2007)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:16:11Z","timestamp":1675829771000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}