{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:20:54Z","timestamp":1745382054101,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_3","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"21-32","source":"Crossref","is-referenced-by-count":0,"title":["Protection Aspects of Iconic Passwords on Mobile Devices"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Braga","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Cividanes","sequence":"additional","affiliation":[]},{"given":"Ismael","family":"\u00c1vila","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Tambascia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff. In: CCS 2005, Alexandria, Virginia, USA, November 7-11 (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical Passwords: Learning from the First Twelve Years. School of Computer Science, Carleton University (2011)","DOI":"10.1145\/2333112.2333114"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Cowan, N.: The magical number 4 in short-term memory: A reconsideration of mental storage capacity. The Behavioral and Brain Sciences\u00a024(1), 87\u2013114; Discussion 114\u2013185","DOI":"10.1017\/S0140525X01003922"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Gehringer, E.F.: Choosing Passwords: Security and Human Factors. In: International Symposium on Technology and Society (ISTAS), pp. 369\u2013373 (2002)","DOI":"10.1109\/ISTAS.2002.1013839"},{"key":"3_CR5","unstructured":"FIPS PUB 112. Password Usage. Appendix E - Password Management Guideline (May 1985)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1037\/0033-295X.101.2.343","volume":"101","author":"G.A. Miller","year":"1955","unstructured":"Miller, G.A.: The Magical Number Seven, Plus or Minus Two - Some Limits on Our Capacity for Processing Information. Psychological Review\u00a0101(2), 343\u2013352 (1955)","journal-title":"Psychological Review"},{"issue":"7","key":"3_CR7","doi-asserted-by":"publisher","first-page":"663","DOI":"10.4304\/jcp.4.7.663-669","volume":"4","author":"K. Helkala","year":"2009","unstructured":"Helkala, K., Snekkenes, E.: Password Generation and Search Space Reduction. Journal of Computers\u00a04(7), 663\u2013669 (2009)","journal-title":"Journal of Computers"},{"issue":"5","key":"3_CR8","doi-asserted-by":"publisher","first-page":"969","DOI":"10.4304\/jcp.6.5.969-975","volume":"6","author":"K. Helkala","year":"2011","unstructured":"Helkala, K.: Password Education Based on Guidelines Tailored to Different Password Categories. Journal of Computers\u00a06(5), 969\u2013975 (2011)","journal-title":"Journal of Computers"},{"key":"3_CR9","unstructured":"Smith, R.E.: Authentication: From Passwords to Public Keys. Addison-Wesley Professional (October 11, 2001) ISBN 978-0201615999"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Gaw, S., Felten, E.W.: Password Management Strategies for Online Accounts. In: Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, July 12-14 (2006)","DOI":"10.1145\/1143120.1143127"},{"key":"3_CR11","unstructured":"Tambascia, C.A., Menezes, E.M., Duarte, R.E.: Usability evaluation of iconographic authentication for mobile devices using eye tracking. In: First International Conference on Mobile Services, Resources, and Users, Barcelona, Spain, October 23-28 (2011)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Shay, R., et al.: Encountering Stronger Password Requirements: User Attitudes and Behaviors. In: Symposium on Usable Privacy and Security (SOUPS), Redmond, WA, USA, July 14-16 (2010)","DOI":"10.1145\/1837110.1837113"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Heiner, A.P., Asokan, N.: A Closer Look at Recognition-based Graphical Passwords on Mobile Devices. In: Symposium on Usable Privacy and Security (SOUPS), Redmond, WA, USA, July 14-16 (2010)","DOI":"10.1145\/1837110.1837114"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M.A. Sasse","year":"2001","unstructured":"Sasse, M.A., et al.: Transforming the \u2018weakest link\u2019 - a human\/computer interaction approach to usable and effective security. BT Tech. Journal\u00a019(3), 122\u2013131 (2001)","journal-title":"BT Tech. Journal"},{"key":"3_CR15","unstructured":"Klein, D.: Foiling the cracker: A survey of, and improvements to, password security. In: 2nd USENIX Security Workshop (1990)"},{"issue":"11","key":"3_CR16","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password Security: A Case History. Communications of the ACM\u00a022(11), 594\u2013597 (1979)","journal-title":"Communications of the ACM"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/11427896_8","volume-title":"Human Interactive Proofs","author":"J. Bentley","year":"2005","unstructured":"Bentley, J., Mallows, C.: How Much Assurance Does a PIN Provide? In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 111\u2013126. Springer, Heidelberg (2005)"},{"key":"3_CR18","unstructured":"\u00c1vila, I., Gudwin, R.: Icons as helpers in the interaction of illiterate users with computers. In: Proc. of the Interfaces and Human Computer Interaction 2009, IHCI 2009, Algarve, Portugal, June 20-22 (2009)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1037\/h0068244","volume":"1","author":"B. Kirkpatrick","year":"1894","unstructured":"Kirkpatrick, B.: An experimental study of memory. Psychological Review\u00a01, 602\u2013609 (1894)","journal-title":"Psychological Review"},{"key":"3_CR20","unstructured":"Madigan, S.: Picture memory. In: Yuille, J. (ed.) Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio, ch. 3, pp. 65\u201389. Lawrence Erlbaum Associates (1983)"},{"issue":"4","key":"3_CR21","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3758\/BF03331011","volume":"11","author":"A. Paivio","year":"1968","unstructured":"Paivio, A., et al.: Why are pictures easier to recall than words? Psychonomic Science\u00a011(4), 137\u2013138 (1968)","journal-title":"Psychonomic Science"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/S0022-5371(67)80067-7","volume":"6","author":"R. Shepard","year":"1967","unstructured":"Shepard, R.: Recognition memory for words, sentences, and pictures. Journal of Verbal Learning and Verbal Behavior\u00a06, 156\u2013163 (1967)","journal-title":"Journal of Verbal Learning and Verbal Behavior"},{"issue":"11","key":"3_CR23","first-page":"135","volume":"52","author":"K. Renald","year":"2009","unstructured":"Renald, K., Angeli, A.: Visual Passwords: Cure-All or Snake-Oil. Communications of the ACM\u00a052(11), 135\u2013140 (2009)","journal-title":"Communications of the ACM"},{"key":"3_CR24","unstructured":"Avila, I.A., Meneses, E.M., Braga, A.M.: Memorization Techniques in Iconic Passwords. In: Interfaces and Human Computer Interaction (IHCI), Lisbon, Portugal (July 2012)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Sedgewick, R.: Permutation Generation Methods. Computing Surveys\u00a09(2) (1977)","DOI":"10.1145\/356689.356692"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:18:20Z","timestamp":1745367500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}