{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:46:03Z","timestamp":1740894363661,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540233756"},{"type":"electronic","value":"9783540301110"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30111-0_8","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T18:35:34Z","timestamp":1294425334000},"page":"96-115","source":"Crossref","is-referenced-by-count":3,"title":["Enabling Access to Computers for People with Poor Reading Skills"],"prefix":"10.1007","author":[{"given":"Albrecht","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"K\u00f6lbl","sequence":"additional","affiliation":[]},{"given":"Siegfried","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Stra\u00dfmeier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Corner, M., Noble, B.: Zero-interaction authentication. In: Proceedings of the Eighth International conference on Mobile Computing and Networking (MOBICOM 2002), pp. 1\u201311 (2002)","DOI":"10.1145\/570645.570647"},{"key":"8_CR2","volume-title":"About Face 2.0: The Essentials of Interaction Design","author":"A. Cooper","year":"2003","unstructured":"Cooper, A., Reimann, R.M.: About Face 2.0: The Essentials of Interaction Design, 2nd edn. John Wiley & Sons, Chichester (2003)","edition":"2"},{"key":"8_CR3","unstructured":"CPS August 2000. Home Computers and Internet Use in the United States: August 2000 (P23-207), http:\/\/www.census.gov\/prod\/2001pubs\/p23-207.pdf"},{"key":"8_CR4","unstructured":"Dhamija, R., Perrig, A.: D\u00e9j\u00e0 Vu: A User Study. Using Images for Authentication. In: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado (August 2000)"},{"key":"8_CR5","unstructured":"Dhamija, R.: D\u00e9j\u00e0 Vu: Using Images for User Authentication. Project Homepage, visited 2004-02-15 (2003), http:\/\/www.sims.berkeley.edu\/~rachna\/dejavu\/"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Nielsen, J. Molich, R.: Heuristic evaluation of user interfaces, Proceedings of ACM CHI 1990 Conf. Seattle, 1-5 April 1900, pp 249-256. additions at (1990), http:\/\/www.useit.com\/papers\/heuristic\/","DOI":"10.1145\/97243.97281"},{"key":"8_CR7","unstructured":"The OECD international program for student assessment. Homepage, visited 2004-02-15, http:\/\/www.pisa.oecd.org\/"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Stanat, Artelt, Baumert, Klieme, Neubrand, Prenzel, Schiefele, Schneider, Sch\u00fcmer, Tillmann, Wei\u00df PISA 2000: Overview of the Study. Design, Method and Results (2000), http:\/\/www.mpib-berlin.mpg.de\/pisa\/PISA-2000_Overview.pdf","DOI":"10.1007\/978-3-322-83412-6"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal\u00a040(3) (2001)","DOI":"10.1147\/sj.403.0614"},{"key":"8_CR10","volume-title":"Designing the User Interface: Strategies for Effective Human- Computer Interaction","author":"B. Shneiderman","year":"1997","unstructured":"Shneiderman, B.: Designing the User Interface: Strategies for Effective Human- Computer Interaction, 3rd edn. Addison-Wesley, Reading (1997)","edition":"3"},{"key":"8_CR11","unstructured":"Homepage of WEB.DE FreeMail, visited 2004-02-15 (2003), http:\/\/web.de"}],"container-title":["Lecture Notes in Computer Science","User-Centered Interaction Paradigms for Universal Access in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30111-0_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:34:10Z","timestamp":1740839650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30111-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540233756","9783540301110"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30111-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}