{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:02:58Z","timestamp":1760061778629},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642011863"},{"type":"electronic","value":"9783642011870"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01187-0_19","type":"book-chapter","created":{"date-parts":[[2009,5,4]],"date-time":"2009-05-04T16:53:15Z","timestamp":1241455995000},"page":"233-239","source":"Crossref","is-referenced-by-count":17,"title":["TwoStep: An Authentication Method Combining Text and Graphical Passwords"],"prefix":"10.1007","author":[{"given":"P. C.","family":"van Oorschot","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Chiasson, S.: Usable Authentication and Click-Based Graphical Passwords. Ph.D thesis, Carleton University, Ottawa, Canada (January 2009)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In: Proc. of HCI 2008 (September 2008)","DOI":"10.14236\/ewic\/HCI2008.12"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-540-74835-9_24","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S. Chiasson","year":"2007","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: Graphical Password Authentication Using Cued Click Points. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 359\u2013374. Springer, Heidelberg (2007)"},{"key":"19_CR4","unstructured":"Real\u00a0User Corporation. The Science Behind Passfaces (September 2001)"},{"key":"19_CR5","unstructured":"Davis, D., Monrose, F., Reiter, M.: On User Choice in Graphical Password Schemes. In: Proc. of 13th USENIX Security Symposium (August 2004)"},{"key":"19_CR6","unstructured":"Dhamija, R., Perrig, A.: Deja Vu: A User Study Using Images for Authentication. In: Proc. of 9th USENIX Security Symposium (August 2000)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Proc. of Human Factors in Computing Systems (April 2006)","DOI":"10.1145\/1124772.1124861"},{"key":"19_CR8","unstructured":"51Logon: Simplifying\u00a0SignIn Experience (in Chinese), http:\/\/www.51Logon.com"},{"key":"19_CR9","unstructured":"Felton, E., Balfanz, D., Dean, D., Wallach, D.: Web Spoofing: An Internet Con Game. In: Proc. of the 20th National Information systems Security Conference (October 1997)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: Proc. of the 2007 World Wide Web (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Schemes (Extended Abstract). In: Proc. of the 2007 IEEE Symposium on Security and Privacy (May 2007)","DOI":"10.1109\/SP.2007.13"},{"key":"19_CR12","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.: The Design and Analysis of Graphical Passwords. In: Proc. of the 8th USENIX Security Symposium, August 23-26 (1999)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing Shoulder-surfing by Using Gaze-based Password Entry. In: Proc. of SOUPS 2007 (July 2007)","DOI":"10.1145\/1280680.1280683"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Rabkin, A.: Personal Knowledge Questions for Fallback Authentication. In: Proc. of the 2008 Symposium On Usable Privacy and Security (SOUPS), July 23-25 (2008)","DOI":"10.1145\/1408664.1408667"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: Proc. of the 2006 IEEE Symposium on Security and Privacy (May 2006)","DOI":"10.1109\/SP.2006.10"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Innovation in an Open World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01187-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T22:14:54Z","timestamp":1589753694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01187-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642011863","9783642011870"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01187-0_19","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2009]]}}}