{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:28:24Z","timestamp":1742934504377,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_7","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["\u201cToo Taxing on the Mind!\u201d Authentication Grids are not for Everyone"],"prefix":"10.1007","author":[{"given":"Kat","family":"Krol","sequence":"first","affiliation":[]},{"given":"Constantinos","family":"Papanicolaou","sequence":"additional","affiliation":[]},{"given":"Alexei","family":"Vernitski","sequence":"additional","affiliation":[]},{"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. (CSUR) 44(4), 19 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy (SP), pp. 553\u2013567 (2012)","DOI":"10.1109\/SP.2012.44"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Q. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Q. Res. psychol."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, M.A.: Are Passfaces more usable than passwords? a field trial investigation. People and Computers XIV \u2014 Usability or Else!, pp. 405\u2013424 (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Inglesant, P., Sasse, M.A.: Evaluating the usability and security of a graphical one-time PIN system. In: 24th BCS Interaction Specialist Group Conference, pp. 88\u201397 (2010)","DOI":"10.14236\/ewic\/HCI2010.13"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0167-739X(99)00055-2","volume":"16","author":"C Ellison","year":"2000","unstructured":"Ellison, C., Hall, C., Milbert, R., Schneier, B.: Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4), 311\u2013318 (2000)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR7","unstructured":"Flor\u00eancio, D., Herley, C., Van Oorschot, P.C.: Password portfolios and the finite-effort user: sustainably managing large numbers of accounts. In: Proceedings of USENIX Security, pp. 575\u2013590 (2014)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/978-3-319-07620-1_15","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"KK Greene","year":"2014","unstructured":"Greene, K.K., Gallagher, M.A., Stanton, B.C., Lee, P.Y.: I can\u2019t type that! P@$$word entry on mobile devices. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 160\u2013171. Springer, Heidelberg (2014)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Krol, K., Moroz, M., Sasse, M.A.: Don\u2019t work. can\u2019t work? why it\u2019s time to rethink security warnings. In: 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), Cork, Ireland, pp. 1\u20138 (2012)","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A.: \"They brought in the horrible key ring thing!\" analysing the usability of two-factor authentication in UK online banking. In: USEC 2015: NDSS Workshop on Usable Security, San Diego, CA, USA (2015)","DOI":"10.14722\/usec.2015.23001"},{"key":"7_CR11","unstructured":"Papanicolaou, C.: Novel Authentication Solution. Department of Computer Science, University College London, London (2013)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Roth, V., Richter, K., Freidinger, R.: A PIN-entry method resilient against shoulder surfing. In: 11th ACM Conference on Computer and Communications Security (CCS), pp. 236\u2013245. ACM, Washington, DC (2004)","DOI":"10.1145\/1030083.1030116"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13:1\u201313:10 (2012)","DOI":"10.1145\/2406367.2406384"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Steves, M., Chisnell, D., Sasse, A., Krol, K., Theofanos, M., Wald, H.: Report: Authentication Diary Study. National Institute of Standards and Technology (NIST). NISTIR 7983 (2014)","DOI":"10.6028\/NIST.IR.7983"},{"key":"7_CR15","unstructured":"Vernitski, A.: Authentication grid. University of Essex, Technical report. \n                      http:\/\/repository.essex.ac.uk\/13231\/\n                      \n                    . Accessed on 21 March 2015"},{"key":"7_CR16","unstructured":"Yang, Y., Lindqvist, J., Oulasvirta, A.: Text entry method affects password security. In: Learning from Authoritative Security Experiment Results (LASER 2014), pp. 11\u201320. USENIX Association, Arlington (2014)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:22:11Z","timestamp":1583508131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}