{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:12Z","timestamp":1742912772354,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_3","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"23-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Predicting Graphical Passwords"],"prefix":"10.1007","author":[{"given":"Matthieu","family":"Devlin","sequence":"first","affiliation":[]},{"given":"Jason R. C.","family":"Nurse","sequence":"additional","affiliation":[]},{"given":"Duncan","family":"Hodges","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Nurse, J.R.C., Creese, S., Goldsmith, M., Lamberts, K.: Guidelines for usable cybersecurity: past and present. In: Proceedings of the 3rd Cyberspace Safety and Security Workshop at the Network and System Security Conference. IEEE (2011)","DOI":"10.1109\/CSS.2011.6058566"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.: The tangled web of password reuse. In: Proceedings of the Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23357"},{"issue":"6","key":"3_CR3","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1002\/acp.1014","volume":"18","author":"AS Brown","year":"2004","unstructured":"Brown, A.S., Bracken, E., Zoccoli, S., Douglas, K.: Generating and remembering passwords. Appl. Cogn. Psychol. 18(6), 641\u2013651 (2004)","journal-title":"Appl. Cogn. Psychol."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: basic results. In: Proceedings of HCII (2005)","DOI":"10.1145\/1073001.1073002"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-74835-9_23","volume-title":"Computer Security \u2013 ESORICS 2007","author":"Krzysztof Go\u0142ofit","year":"2007","unstructured":"Go\u0142ofit, Krzysztof: Click Passwords Under Investigation. In: Biskup, Joachim, L\u00f3pez, Javier (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 343\u2013358. Springer, Heidelberg (2007)"},{"issue":"4","key":"3_CR6","doi-asserted-by":"crossref","first-page":"669","DOI":"10.3233\/JCS-2010-0411","volume":"19","author":"PC Oorschot van","year":"2011","unstructured":"van Oorschot, P.C., Thorpe, J.: Exploiting predictability in click-based graphical passwords. J. Comput. Secur. 19(4), 669\u2013702 (2011)","journal-title":"J. Comput. Secur."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.C.: Modeling user choice in the passpoints graphical password scheme. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, ACM, pp. 20\u201328 (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"3_CR8","unstructured":"Bixler, B.: Learning styles inventory. \n                      www.personal.psu.edu\/bxb11\/LSI\/LSI.htm\n                      \n                     (n.d.). Accessed 5 Jan 2015"},{"issue":"4","key":"3_CR9","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1002\/bdm.414","volume":"15","author":"EU Weber","year":"2002","unstructured":"Weber, E.U., Blais, A.R., Betz, N.E.: A domain-specific risk-attitude scale: measuring risk perceptions and risk behaviors. J. Behav. Decis. Making 15(4), 263\u2013290 (2002)","journal-title":"J. Behav. Decis. Making"},{"key":"3_CR10","volume-title":"Discovering Statistics Using SPSS","author":"A Field","year":"2009","unstructured":"Field, A.: Discovering Statistics Using SPSS, 3rd edn. Sage Publications, Los Angeles (2009)","edition":"3"},{"issue":"11","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/34.730558","volume":"20","author":"L Itti","year":"1998","unstructured":"Itti, L., Koch, C., Niebur, E.: A model of saliency-based visual attention for rapid scene analysis. IEEE TPAMI 20(11), 1254\u20131259 (1998)","journal-title":"IEEE TPAMI"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:19:35Z","timestamp":1583507975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}