{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:02:04Z","timestamp":1760061724136},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642404764"},{"type":"electronic","value":"9783642404771"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40477-1_26","type":"book-chapter","created":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T18:20:56Z","timestamp":1375122056000},"page":"424-441","source":"Crossref","is-referenced-by-count":10,"title":["A Comprehensive Study of the Usability of Multiple Graphical Passwords"],"prefix":"10.1007","author":[{"given":"Soumyadeb","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Ron","family":"Poet","sequence":"additional","affiliation":[]},{"given":"Lewis","family":"Mackenzie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Adams, A., Sasse, M.: Users are Not the Enemy. Communications of the ACM, 40\u201346 (1999)","DOI":"10.1145\/322796.322806"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of 16th International Conference on World Wide Web, University of Calgary, pp. 657\u2013666 (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? A field trial in-vestigation. In: Proceedings of HCI on People and Computers XIV, pp. 405\u2013424 (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"26_CR4","unstructured":"Madigan, S.: Picture Memory Imagery, Memory, and Cognition: Essays in Honor of Allan Paivio. In: Yuille, J. (ed.). Lawrence Erlbaum Associates, Hillsdale (1983)"},{"key":"26_CR5","volume-title":"Mental Representataions: A Dual Coding Approach","author":"A. Paivio","year":"1986","unstructured":"Paivio, A.: Mental Representataions: A Dual Coding Approach. Oxford Press, UK (1986)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Chowdhury, S., Poet, R.: Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: Proceeding of Conference on User Science and Engineering, pp. 54\u201358 (2011)","DOI":"10.1109\/iUSEr.2011.6150536"},{"key":"26_CR7","unstructured":"Davis, D., Monrose, F., Reiter, M.: On user choice in graphical password schemes. In: Proceedings of the Conference on USENIX Security Symposium, vol.\u00a013, p. 11 (2005)"},{"key":"26_CR8","unstructured":"Dhamija, R., Perrig, A.: D\u00e9j\u00e0 vu: A user study using images for authentication. In: Proceedings of the Conference on USENIX Security Symposium, vol.\u00a09, p. 4 (2000)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Renaud, K.: A Visuo- Biometric Authentication Mechanism for Old Users. In: Proceeding of British HCI, pp. 167\u2013182 (2005)","DOI":"10.1007\/1-84628-249-7_11"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Renaud, K.: Web authentication using Mikon images. In: Proceedings of World Congress on Privacy, Security, Trust and the management of E-Business, pp. 1\u201310 (2009)","DOI":"10.1109\/CONGRESS.2009.10"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Moncur, W., Lepl\u00e2tre, G.: Pictures at the ATM: exploring the usability of multiple graphical passwords. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 887\u2013894 (2007)","DOI":"10.1145\/1240624.1240758"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Everitt, K., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference and training of multiple graphical passwords. In: Proceedings of Conference on Human Factors in Computing Systems, pp. 889\u2013898 (2009)","DOI":"10.1145\/1518701.1518837"},{"key":"26_CR13","unstructured":"SUS questionnaire (2013), \n                      \n                        http:\/\/www.usabilitynet.org\/trump\/methods\/satisfaction.htm\n                      \n                      \n                     (accessed January 19, 2013)"},{"key":"26_CR14","unstructured":"NASA Task Load Index, \n                      \n                        http:\/\/humansystems.arc.nasa.gov\/groups\/TLX\/downloads\/TLXScale.pdf\n                      \n                      \n                     (accessed January 19, 2013)"},{"key":"26_CR15","volume-title":"Basics of qualitative research: Grounded theory procedures and techniques","author":"A. Strauss","year":"1990","unstructured":"Strauss, A., Corbin, J.: Basics of qualitative research: Grounded theory procedures and techniques. Sage, Newbury Park (1990)"},{"issue":"5","key":"26_CR16","doi-asserted-by":"publisher","first-page":"202","DOI":"10.3758\/BF03200774","volume":"1","author":"M. Wolfe","year":"1994","unstructured":"Wolfe, M.: Guided search 2.0 a revised model of visual search. Psychonomic Bulletin & Review\u00a01(5), 202\u2013238 (1994)","journal-title":"Psychonomic Bulletin & Review"},{"key":"26_CR17","unstructured":"Szekely, A., Bates, E.: Objective visual complexity as a variable in picture naming, University of California. CRL Newsletter Center for Research in Language, pp. 3\u201333 (1999)"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40477-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T01:47:39Z","timestamp":1557971259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40477-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642404764","9783642404771"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40477-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}