{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:11Z","timestamp":1759091531158},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138404"},{"type":"electronic","value":"9783319138411"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13841-1_12","type":"book-chapter","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T13:02:35Z","timestamp":1417611755000},"page":"204-225","source":"Crossref","is-referenced-by-count":6,"title":["Authentication Schemes - Comparison and Effective Password Spaces"],"prefix":"10.1007","author":[{"given":"Peter","family":"Mayer","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Michaela","family":"Kauer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.C.: Graphical passwords: Learning from the first twelve years. CSUR 44(4) (August 2012)","DOI":"10.1145\/2333112.2333114"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In: Proc. IEEE S&P, pp. 538\u2013552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"12_CR3","unstructured":"Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: Proc. WEIS 2010 (June 2010)"},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S. Chiasson","year":"2012","unstructured":"Chiasson, S., Stobert, E., Forget, A., Biddle, R., van Oorschot, P.C.: Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. IEEE Trans. on Dep. and Sec. Comp.\u00a09(2), 222\u2013235 (2012)","journal-title":"IEEE Trans. on Dep. and Sec. Comp."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing users towards better passwords: persuasive cued click-points. In: Proc. BCS-HCI 2008 (September 2008)","DOI":"10.14236\/ewic\/HCI2008.12"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Stobert, E., van Oorschot, P.C., Biddle, R.: Multiple password interference in text passwords and click-based graphical passwords. In: Proc. CCS 2009, pp. 500\u2013511. ACM (November 2009)","DOI":"10.1145\/1653662.1653722"},{"key":"12_CR7","unstructured":"Davis, D., Monrose, F., Reiter, M.K.: On user choice in graphical password schemes. In: Proc. USENIX 2004, pp. 151\u2013164 (2004)"},{"key":"12_CR8","unstructured":"Dhamija, R., Perrig, A.: Deja Vu: A user study using images for authentication. In: Proc. SSYM 2000, pp. 45\u201358 (2000)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.C.: Modeling user choice in the PassPoints graphical password scheme. In: Proc. SOUPS 2007, pp. 20\u201328 (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Is FacePIN secure and usable? In: Proc. SOUPS 2007 (July 2007)","DOI":"10.1145\/1280680.1280710"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1111\/j.2044-8295.1975.tb01477.x","volume":"66","author":"H.D. Ellis","year":"2011","unstructured":"Ellis, H.D.: Recognizing Faces. Brit. J. of Psychology\u00a066(4), 409\u2013426 (2011)","journal-title":"Brit. J. of Psychology"},{"issue":"7","key":"12_CR12","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1037\/0003-066X.63.7.591","volume":"63","author":"D.M. Erceg-Hurn","year":"2008","unstructured":"Erceg-Hurn, D.M., Mirosevich, V.M.: Modern robust statistical methods: An easy way to maximize the accuracy and power of your research. American Psychologist\u00a063(7), 591\u2013601 (2008)","journal-title":"American Psychologist"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proc. CHI 2009, pp. 889\u2013898 (2009)","DOI":"10.1145\/1518701.1518837"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Acar, Y., Smith, M.: On the ecological validity of a password study. In: Proc. SOUPS 2013, pp. 13:1\u201313:13 (2013)","DOI":"10.1145\/2501604.2501617"},{"key":"12_CR15","unstructured":"Field, A., Miles, J., Field, Z.: Discovering Statistics Using R. SAGE Publications Limited (March 2012)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio, D., Herley, C.: A large-scale study of web password habits. In: Proc. WWW 2007, pp. 657\u2013666 (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio, D., Herley, C.: Where do security policies come from? In: Proc. SOUPS 2010 (2010)","DOI":"10.1145\/1837110.1837124"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Hlywa, M., Biddle, R., Patrick, A.S.: Facing the facts about image type in recognition-based graphical passwords. In: Proc. ACSAC 2011, pp. 149\u2013158 (2011)","DOI":"10.1145\/2076732.2076754"},{"issue":"4","key":"12_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B. Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Comm. of the ACM\u00a047(4), 75\u201378 (2004)","journal-title":"Comm. of the ACM"},{"key":"12_CR20","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proc. SSYM 1999 (1999)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Komanduri, S., Mazurek, M.L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L.F., Lopez, J.: Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In: Proc. IEEE S&P, pp. 523\u2013537 (2012)","DOI":"10.21236\/ADA570747"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Komanduri, S., Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F., Egelman, S.: Of Passwords and People: Measuring the Effect of Password-Composition Policies. In: Proc. CHI 2011, pp. 2595\u20132604 (2011)","DOI":"10.1145\/1978942.1979321"},{"issue":"2","key":"12_CR23","doi-asserted-by":"publisher","first-page":"217","DOI":"10.2307\/1413251","volume":"26","author":"E.F. Mulhall","year":"1915","unstructured":"Mulhall, E.F.: Experimental Studies in Recall and Recognition. Am. J. of Psych.\u00a026(2), 217\u2013228 (1915)","journal-title":"Am. J. of Psych."},{"key":"12_CR24","unstructured":"Nali, D., Thorpe, J.: Analyzing user choice in graphical passwords. School of Comp. Sci. (2004)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Noguchi, K., Gel, Y.R., Brunner, E.: nparLD: An R Software Package for the Nonparametric Analysis of Longitudinal Data in Factorial Experiments. J. of Statistical Software 50(12) (September 2012)","DOI":"10.18637\/jss.v050.i12"},{"key":"12_CR26","unstructured":"Real User Corporation: The Science Behind Passfaces (July 2004)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Schaub, F., Walch, M., K\u00f6nings, B., Weber, M.: Exploring The Design Space of Graphical Passwords on Smartphones. In: Proc. SOUPS 2013. ACM (July 2013)","DOI":"10.1145\/2501604.2501615"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F.: Encountering Stronger Password Requirements: User Attitudes and Behaviors. In: Proc. SOUPS 2010 (July 2010)","DOI":"10.1145\/1837110.1837113"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: Proc. SOUPS 2013. ACM Press, New York (2013)","DOI":"10.1145\/2501604.2501619"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Stobert, E., Forget, A., Chiasson, S., van Oorschot, P.C., Biddle, R.: Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords. In: Proc. ACSAC 2010, pp. 79\u201388 (2010)","DOI":"10.1145\/1920261.1920273"},{"key":"12_CR31","unstructured":"Suo, X., Zhu, Y., Owen, G.S.: Graphical Passwords: A Survey. In: Proc. ACSAC 2005 (2005)"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Weinshall, D., Kirkpatrick, S.: Passwords you\u2019ll never forget, but can\u2019t recall. In: CHI EA 2004, pp. 1399\u20131402 (2004)","DOI":"10.1145\/985921.986074"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. In: Proc. CCS 2010, pp. 162\u2013175 (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In: Proc. SOUPS 2005, pp. 1\u201312. ACM (2005)","DOI":"10.1145\/1073001.1073002"},{"issue":"1-2","key":"12_CR35","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S. Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: Design and longitudinal evaluation of a graphical password system. Int. J. of Hum.-Comp. Studies\u00a063(1-2), 102\u2013127 (2005)","journal-title":"Int. J. of Hum.-Comp. Studies"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Wilcox, R.R.: Introduction to Robust Estimation & Hypothesis Testing, 3rd edn. Elsevier Academic Press (February 2012)","DOI":"10.1016\/B978-0-12-386983-8.00010-X"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13841-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T14:07:55Z","timestamp":1598537275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13841-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138404","9783319138411"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13841-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}