{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:14Z","timestamp":1761621014923},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_2","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"15-29","source":"Crossref","is-referenced-by-count":7,"title":["Graphical Passwords as Browser Extension: Implementation and Usability Study"],"prefix":"10.1007","author":[{"given":"Kemal","family":"Bicakci","sequence":"first","affiliation":[]},{"given":"Mustafa","family":"Yuceel","sequence":"additional","affiliation":[]},{"given":"Burak","family":"Erdeniz","sequence":"additional","affiliation":[]},{"given":"Hakan","family":"Gurbaslar","sequence":"additional","affiliation":[]},{"given":"Nart Bedin","family":"Atalay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"65","volume-title":"Imagery, Memory and Cognition","author":"S. Madigan","year":"1983","unstructured":"Madigan, S.: Picture Memory. In: Yuille, J.C. (ed.) Imagery, Memory and Cognition, pp. 65\u201389. Lawrence Erlbaum Associates, NJ (1983)"},{"key":"2_CR2","unstructured":"Thorpe, J., van Oorschot, P.C.: Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In: 16th Usenix Security Symposium, Boston, USA, pp. 103\u2013118 (2007)"},{"key":"2_CR3","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: Proceedings of the 14th USENIX Security Symposium, Baltimore, USA (2005)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Halderman, J., Waters, B., Felten, E.: A convenient method for securely managing passwords. In: Proceedings of the 14th International World Wide Web Conference (2005)","DOI":"10.1145\/1060745.1060815"},{"key":"2_CR5","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: A Usability Study and Critique of Two Password Managers. In: 15th USENIX Security Symposium 2006, Vancouver, Canada (2006)"},{"key":"2_CR6","unstructured":"Likert, R.: A technique for the measurement of attitudes. Arch. Psychol.\u00a0140, I\u20135.5 (1932)"},{"key":"2_CR7","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260531","volume-title":"Usability Inspection Methods","author":"J. Nielsen","year":"1994","unstructured":"Nielsen, J., Mack, R.L.: Usability Inspection Methods. John Wiley & Sons, Inc., Chichester (1994)"},{"key":"2_CR8","volume-title":"Security and Usability:Designing Systems that People Can Use, edited collection edn","author":"L.F. Cranor","year":"2005","unstructured":"Cranor, L.F., Garfinkel, S.: Security and Usability:Designing Systems that People Can Use, edited collection edn. O\u2019Reilly Media, Sebastopol (2005)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Bicakci, K.: Optimal Discretization for High-Entropy Graphical Passwords. In: 23rd International Symposium on Computer and Information Sciences, IEEE ISCIS 2008, Istanbul, Turkey, October 27-29 (2008)","DOI":"10.1109\/ISCIS.2008.4717862"},{"issue":"3","key":"2_CR10","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TIFS.2006.879305","volume":"1","author":"J.C. Birget","year":"2006","unstructured":"Birget, J.C., Hong, D., Memon, N.: Graphical Passwords Based on Robust Discretization. IEEE Transactions on Information Forensics and Security\u00a01(3), 395\u2013399 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: Design and longitudinal evaluation of a graphical password system. International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security)\u00a063 (2005)","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-540-74835-9_24","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S. Chiasson","year":"2007","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: Graphical Password Authentication Using Cued Click Points. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 359\u2013374. Springer, Heidelberg (2007)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In: HCI 2008, Liverpool, UK, September 1-5 (2008)","DOI":"10.14236\/ewic\/HCI2008.12"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T07:58:33Z","timestamp":1589875113000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}