{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:08:27Z","timestamp":1742929707615,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164408"},{"type":"electronic","value":"9783642164415"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16441-5_16","type":"book-chapter","created":{"date-parts":[[2010,10,15]],"date-time":"2010-10-15T00:16:38Z","timestamp":1287101798000},"page":"239-254","source":"Crossref","is-referenced-by-count":1,"title":["On the Usability of User Interfaces for Secure Website Authentication in Browsers"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Pala","sequence":"first","affiliation":[]},{"given":"Yifei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Cab forum homepage, \n                    \n                      http:\/\/www.cabforum.org"},{"key":"16_CR2","unstructured":"OpenID Specifications, \n                    \n                      http:\/\/openid.net\/developers\/specs\/"},{"key":"16_CR3","unstructured":"Wikipedia. phishing, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Phishing"},{"key":"16_CR4","first-page":"396","volume-title":"AMS 2008: Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS)","author":"M.D.H. Abdullah","year":"2008","unstructured":"Abdullah, M.D.H., Abdullah, A.H., Ithnin, N., Mammi, H.K.: Towards identifying usability and security features of graphical password in knowledge based authentication technique. In: AMS 2008: Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), pp. 396\u2013403. IEEE Computer Society Press, Washington (2008)"},{"key":"16_CR5","first-page":"1","volume-title":"WOOT 2008: Proceedings of the 2nd conference on USENIX Workshop on offensive technologies","author":"M. Cova","year":"2008","unstructured":"Cova, M., Kruegel, C., Vigna, G.: There is no free phish: an analysis of \u201dfree\u201d and live phishing kits. In: WOOT 2008: Proceedings of the 2nd conference on USENIX Workshop on offensive technologies, pp. 1\u20138. USENIX Association, Berkeley (2008)"},{"key":"16_CR6","first-page":"581","volume-title":"CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: CHI 2006: Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 581\u2013590. ACM Press, New York (2006)"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1145\/1357054.1357219","volume-title":"CHI 2008: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems","author":"S. Egelman","year":"2008","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: CHI 2008: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems,, Italy, pp. 1065\u20131074. ACM, New York (2008)"},{"issue":"4","key":"16_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1391949.1391950","volume":"8","author":"A. Herzberg","year":"2008","unstructured":"Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol.\u00a08(4), 1\u201336 (2008)","journal-title":"ACM Trans. Internet Technol."},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1145\/1233341.1233448","volume-title":"ACM-SE 45: Proceedings of the 45th annual southeast regional conference","author":"C. Hinds","year":"2007","unstructured":"Hinds, C., Ekwueme, C.: Increasing security and usability of computer systems with graphical passwords. In: ACM-SE 45: Proceedings of the 45th annual southeast regional conference, pp. 529\u2013530. ACM, New York (2007)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-77366-5_27","volume-title":"Financial Cryptography and Data Security","author":"C. Jackson","year":"2007","unstructured":"Jackson, C., Simon, D.R., Tan, D.S., Barth, A.: An evaluation of extended validation and picture-in-picture phishing attacks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol.\u00a04886, pp. 281\u2013293. Springer, Heidelberg (2007)"},{"key":"16_CR11","unstructured":"Pala, M.: The PKI Resource Query Protocol (PRQP). Internet Draft (May 2009), \n                    \n                      http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-pkix-prqp-03.txt"},{"key":"16_CR12","first-page":"13","volume-title":"SOUPS 2008: Proceedings of the 4th symposium on Usable privacy and security","author":"A. Rabkin","year":"2008","unstructured":"Rabkin, A.: Personal knowledge questions for fallback authentication: security questions in the era of facebook. In: SOUPS 2008: Proceedings of the 4th symposium on Usable privacy and security, pp. 13\u201323. ACM, New York (2008)"},{"issue":"5","key":"16_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security and Privacy"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructures, Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16441-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:01:36Z","timestamp":1558292496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16441-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164408","9783642164415"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16441-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}