{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:53:08Z","timestamp":1743007988685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319612034"},{"type":"electronic","value":"9783319612041"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61204-1_7","type":"book-chapter","created":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:02:42Z","timestamp":1498370562000},"page":"124-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks"],"prefix":"10.1007","author":[{"given":"Bruce","family":"Berg","sequence":"first","affiliation":[]},{"given":"Tyler","family":"Kaczmarek","sequence":"additional","affiliation":[]},{"given":"Alfred","family":"Kobsa","sequence":"additional","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,26]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.2466\/pms.1975.40.1.231","volume":"40","author":"VA Benignus","year":"1975","unstructured":"Benignus, V.A., Otto, D.A., Knelson, J.H.: Effect of low-frequency random noises on performance of a numeric monitoring task. Percept. Mot. Skills 40(1), 231\u2013239 (1975)","journal-title":"Percept. Mot. Skills"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"2737","DOI":"10.1007\/978-0-387-79948-3_1340","volume-title":"Encyclopedia of Clinical Neuropsychology","author":"RA Cohen","year":"2011","unstructured":"Cohen, R.A.: Yerkes-Dodson law. In: Kreutzer, J.S., DeLuca, J., Caplan, B. (eds.) Encyclopedia of Clinical Neuropsychology, pp. 2737\u20132738. Springer, New York (2011)"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"R115","DOI":"10.1016\/j.cub.2004.01.018","volume":"14","author":"M Eimer","year":"2004","unstructured":"Eimer, M.: Multisensory integration: how visual experience shapes spatial perception. Curr. Biol. 14(3), R115\u2013R117 (2004)","journal-title":"Curr. Biol."},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-39884-1_6","volume-title":"Financial Cryptography and Data Security","author":"A Gallego","year":"2013","unstructured":"Gallego, A., Saxena, N., Voris, J.: Exploring extrinsic motivation for better security: a usability study of scoring-enhanced device pairing. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 60\u201368. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39884-1_6"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1504\/IJSN.2009.023426","volume":"4","author":"MT Goodrich","year":"2009","unstructured":"Goodrich, M.T., Sirivianos, M., Solis, J., Soriente, C., Tsudik, G., Uzun, E.: Using audio in secure device pairing. Int. J. Secure. Netw. 4(1), 57\u201368 (2009)","journal-title":"Int. J. Secure. Netw."},{"key":"7_CR6","unstructured":"Harris, W., Stress, P.: The effects of intense noise stimulation and noxious stimulation upon perceptual performance. Ph.D. thesis, University of Southern California (1960)"},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/14640747008401898","volume":"22","author":"GRJ Hockey","year":"1970","unstructured":"Hockey, G.R.J.: Effect of loud noise on attentional selectivity. Q. J. Exp. Psychol. 22(1), 28\u201336 (1970)","journal-title":"Q. J. Exp. Psychol."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kaczmarek, T., Kobsa, A., Sy, R., Tsudik, G.: An unattended study of users performing security critical tasks under adversarial noise. In: Proceedings of the NDSS Workshop on Useable Security, pp. 14:1\u201314:12 (2015)","DOI":"10.14722\/usec.2015.23014"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 11:1\u201311:12 (2009). ACM ID: 1572547","DOI":"10.1145\/1572532.1572547"},{"key":"7_CR10","unstructured":"Kline, D.W., Schieber F.: Vision and aging (1985)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., Wang, Y.: Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 10:1\u201310:12 (2009). ACM ID: 1572546","DOI":"10.1145\/1572532.1572546"},{"issue":"3","key":"7_CR12","doi-asserted-by":"publisher","first-page":"823","DOI":"10.2466\/pms.1990.70.3.823","volume":"70","author":"HS Koelega","year":"1990","unstructured":"Koelega, H.S., Brinkman, J.-A., Zwep, B., Verbaten, M.N.: Dynamic vs static stimuli in their effect on visual vigilance performance. Percept. Mot. Skills 70(3), 823\u2013831 (1990)","journal-title":"Percept. Mot. Skills"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. Cryptology ePrint Archive, report 2005\/424 (2005). http:\/\/eprint.iacr.org\/","DOI":"10.1007\/11935070_6"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Lazem, S., Gracanin, D.: Social traps in second life. In: 2010 Second International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES), pp. 133\u2013140, March 2010","DOI":"10.1109\/VS-GAMES.2010.29"},{"issue":"3","key":"7_CR15","first-page":"396","volume":"38","author":"K Naz","year":"2004","unstructured":"Naz, K., Epps, H.: Relationship between color and emotion: a study of college students. Coll. Stud. J. 38(3), 396 (2004)","journal-title":"Coll. Stud. J."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Nickerson, D.: History of the Munsell color system and its scientific application. J. Opt. Soc., 575\u2013586 (1940)","DOI":"10.1364\/JOSA.30.000575"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Saxena, N., Tsudik, G., Uzun, E.: Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 331\u2013340 (2010). ACM ID: 1864399","DOI":"10.1145\/1864349.1864399"},{"issue":"1","key":"7_CR18","first-page":"71","volume":"1","author":"H Ollesch","year":"2006","unstructured":"Ollesch, H., Heineken, E., Schulte, F.P.: Physical or virtual presence of the experimenter: psychological online-experiments in different settings. Int. J. Internet Sci. 1(1), 71\u201381 (2006)","journal-title":"Int. J. Internet Sci."},{"issue":"3","key":"7_CR19","doi-asserted-by":"publisher","first-page":"715","DOI":"10.2466\/pms.1977.44.3.715","volume":"44","author":"EL Olmedo","year":"1977","unstructured":"Olmedo, E.L., Kirk, R.E.: Maintenance of vigilance by non-task-related stimulation in the monitoring environment. Percept. Mot. Skills 44(3), 715\u2013723 (1977)","journal-title":"Percept. Mot. Skills"},{"issue":"3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"887","DOI":"10.2466\/pms.1971.33.3.887","volume":"33","author":"JJ O\u2019Malley","year":"1971","unstructured":"O\u2019Malley, J.J., Poplawsky, A.: Noise-induced arousal and breadth of attention. Percept. Mot. Skills 33(3), 887\u2013890 (1971)","journal-title":"Percept. Mot. Skills"},{"issue":"1","key":"7_CR21","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1089\/109493103321167983","volume":"6","author":"G Riva","year":"2003","unstructured":"Riva, G., Teruzzi, T., Anolli, L.: The use of the internet in psychological research: comparison of online and offline questionnaires. CyberPsychol. Behav. 6(1), 73\u201380 (2003)","journal-title":"CyberPsychol. Behav."},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-77366-5_29","volume-title":"Financial Cryptography and Data Security","author":"E Uzun","year":"2007","unstructured":"Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 307\u2013324. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-77366-5_29"},{"key":"7_CR23","volume-title":"Color Science","author":"G Wyszecki","year":"1982","unstructured":"Wyszecki, G., Stiles, W.S.: Color Science, vol. 8. Wiley, New York (1982)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61204-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:03:59Z","timestamp":1656201839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61204-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319612034","9783319612041"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61204-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kanazawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cy2sec.comm.eng.osaka-u.ac.jp\/acns2017\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}