{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:56:24Z","timestamp":1753520184121},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642404764"},{"type":"electronic","value":"9783642404771"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40477-1_27","type":"book-chapter","created":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T22:20:56Z","timestamp":1375136456000},"page":"442-459","source":"Crossref","is-referenced-by-count":11,"title":["Security for Diversity: Studying the Effects of Verbal and Imagery Processes on User Authentication Mechanisms"],"prefix":"10.1007","author":[{"given":"Marios","family":"Belk","sequence":"first","affiliation":[]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Germanakos","sequence":"additional","affiliation":[]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Shay, R., Kelley, P., Komanduri, S., Mazurek, M., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L.: Correct Horse Battery Staple: Exploring the Usability of System-assigned Passphrases. In: ACM Symposium on Usable Privacy and Security, Article 7, 20 pages. ACM Press, New York (2012)","DOI":"10.1145\/2335356.2335366"},{"key":"27_CR2","first-page":"2595","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"S. Komanduri","year":"2011","unstructured":"Komanduri, S., Shay, R., Kelley, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L., Egelman, S.: Of Passwords and People: Measuring the Effect of Password-composition Policies. In: ACM International Conference on Human Factors in Computing Systems, pp. 2595\u20132604. ACM Press, New York (2011)"},{"key":"27_CR3","first-page":"383","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"P. Inglesant","year":"2010","unstructured":"Inglesant, P., Sasse, A.: The True Cost of Unusable Password Policies: Password use in the Wild. In: ACM International Conference on Human Factors in Computing Systems, pp. 383\u2013392. ACM Press, New York (2010)"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/1242572.1242661","volume-title":"ACM International Conference on World Wide Web","author":"D. Florencio","year":"2007","unstructured":"Florencio, D., Herley, C.A.: Large-scale Study of Web Password Habits. In: ACM International Conference on World Wide Web, pp. 657\u2013666. ACM Press, New York (2007)"},{"issue":"12","key":"27_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, A.: Users are not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. J. Communications of the ACM\u00a042(12), 40\u201346 (1999)","journal-title":"J. Communications of the ACM"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Shay, R., Komanduri, S., Kelley, P., Leon, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L.: Encountering Stronger Password Requirements: User Attitudes and Behaviors. In: ACM Symposium on Usable Privacy and Security, Article 2, 20 pages. ACM Press, New York (2010)","DOI":"10.1145\/1837110.1837113"},{"key":"27_CR7","first-page":"553","volume-title":"IEEE Symposium on Security and Privacy","author":"J. Bonneau","year":"2012","unstructured":"Bonneau, J., Herley, C., van Oorschot, P., Stajano, F.: The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In: IEEE Symposium on Security and Privacy, pp. 553\u2013567. IEEE Computer Society, Washington, DC (2012)"},{"key":"27_CR8","first-page":"197","volume-title":"IEEE International Conference on Privacy, Security and Trust","author":"D. LeBlanc","year":"2010","unstructured":"LeBlanc, D., Forget, A., Biddle, R.: Guessing Click-based Graphical Passwords by Eye Tracking. In: IEEE International Conference on Privacy, Security and Trust, pp. 197\u2013204. IEEE Computer Society, Washington, DC (2010)"},{"issue":"2","key":"27_CR9","first-page":"165","volume":"18","author":"J. Zhang","year":"2009","unstructured":"Zhang, J., Luo, X., Akkaladevi, S., Ziegelmayer, J.: Improving Multiple-password Recall: An Empirical Study. J. Information Security\u00a018(2), 165\u2013176 (2009)","journal-title":"J. Information Security"},{"issue":"1-2","key":"27_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ijhcs.2005.04.020","volume":"63","author":"A.D. Angeli","year":"2005","unstructured":"Angeli, A.D., Coventry, L., Johnson, G., Renaud, K.: Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems. J. Human-Computer Studies\u00a063(1-2), 128\u2013152 (2005)","journal-title":"J. Human-Computer Studies"},{"key":"27_CR11","first-page":"889","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"K.M. Everitt","year":"2009","unstructured":"Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.A.: Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords. In: ACM International Conference on Human Factors in Computing Systems, pp. 889\u2013898. ACM Press, New York (2009)"},{"key":"27_CR12","first-page":"1789","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"T.S. Tullis","year":"2011","unstructured":"Tullis, T.S., Tedesco, D.P., McCaffrey, K.E.: Can Users Remember their Pictorial Passwords Six Years Later. In: ACM International Conference on Human Factors in Computing Systems, pp. 1789\u20131794. ACM Press, New York (2011)"},{"issue":"4","key":"27_CR13","first-page":"41","volume":"44","author":"R. Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. J. ACM Computing Surveys\u00a044(4), 41 pages (2012)","journal-title":"J. ACM Computing Surveys"},{"key":"27_CR14","first-page":"405","volume-title":"BCS International Conference on People and Computers","author":"S. Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are Passfaces More Usable than Passwords: A Field Trial Investigation. In: BCS International Conference on People and Computers, pp. 405\u2013410. British Computer Society, UK (2000)"},{"key":"27_CR15","unstructured":"Passfaces Corporation. The science behind Passfaces, \n                      \n                        http:\/\/www.passfaces.com\/enterprise\/resources\/whitepapers.htm"},{"key":"27_CR16","first-page":"889","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"K. Everitt","year":"2009","unstructured":"Everitt, K., Bragin, T., Fogarty, J., Kohno, T.: A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords. In: ACM International Conference on Human Factors in Computing Systems, pp. 889\u2013898. ACM Press, New York (2009)"},{"key":"27_CR17","first-page":"79","volume-title":"ACM International Conference on Computer Security Applications Conference","author":"E. Stobert","year":"2010","unstructured":"Stobert, E., Forget, A., Chiasson, S., van Oorschot, P., Biddle, R.: Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords. In: ACM International Conference on Computer Security Applications Conference, pp. 79\u201388. ACM Press, New York (2010)"},{"key":"27_CR18","first-page":"1","volume-title":"USENIX Security Symposium","author":"I. Jermyn","year":"1999","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The Design and Analysis of Graphical Passwords. In: USENIX Security Symposium, p. 1. USENIX Association, Berkley (1999)"},{"key":"27_CR19","first-page":"121","volume-title":"IEEE International Conference on Computer Security Applications","author":"H. Gao","year":"2008","unstructured":"Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: YAGP: Yet Another Graphical Password Strategy. In: IEEE International Conference on Computer Security Applications, pp. 121\u2013129. IEEE Computer Society, Washington, DC (2008)"},{"issue":"2","key":"27_CR20","first-page":"273","volume":"7","author":"H. Tao","year":"2008","unstructured":"Tao, H., Adams, C.: Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. J. Network Security\u00a07(2), 273\u2013292 (2008)","journal-title":"J. Network Security"},{"key":"27_CR21","first-page":"1","volume-title":"ACM Symposium on Usable Privacy and Security","author":"S. Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N.: Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In: ACM Symposium on Usable Privacy and Security, pp. 1\u201312. ACM Press, New York (2005)"},{"key":"27_CR22","first-page":"121","volume-title":"International Conference, B.C.S. on People and Computers","author":"S. Chiasson","year":"2008","unstructured":"Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.: Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. In: International Conference, B.C.S. on People and Computers, pp. 121\u2013130. British Computer Society, UK (2008)"},{"key":"27_CR23","first-page":"3011","volume-title":"ACM International Conference on Human Factors in Computing Systems","author":"A. Bulling","year":"2012","unstructured":"Bulling, A., Alt, F., Schmidt, A.: Increasing the Security of Gaze-based Cued-recall Graphical Passwords using Saliency Masks. In: ACM International Conference on Human Factors in Computing Systems, pp. 3011\u20133020. ACM Press, New York (2012)"},{"issue":"6","key":"27_CR24","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.intcom.2011.09.001","volume":"23","author":"M. Mihajlov","year":"2011","unstructured":"Mihajlov, M., Jerman-Blazic, B.: On Designing Usable and Secure Recognition-based Graphical Authentication Mechanisms. J. Interacting with Computers\u00a023(6), 582\u2013593 (2011)","journal-title":"J. Interacting with Computers"},{"key":"27_CR25","first-page":"1967","volume-title":"ACM International Conference on Human Factors in Computing Systems (Ext. Abstracts)","author":"J. Nicholson","year":"2012","unstructured":"Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., Olivier, P.A.: Security Assessment of Tiles: a New Portfolio-based Graphical Authentication System. In: ACM International Conference on Human Factors in Computing Systems (Ext. Abstracts), pp. 1967\u20131972. ACM Press, New York (2012)"},{"key":"27_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1408664.1408666","volume-title":"ACM International Symposium on Usable Privacy and Security","author":"A. Forget","year":"2008","unstructured":"Forget, A., Chiasson, S., van Oorschot, P., Biddle, R.: Improving Text Passwords Through Persuasion. In: ACM International Symposium on Usable Privacy and Security, pp. 1\u201312. ACM Press, New York (2008)"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Wright, N., Patrick, A., Biddle, R.: Do You See Your Password?: Applying Recognition to Textual Passwords. In: ACM International Symposium on Usable Privacy and Security, Article 8, 14 pages. ACM Press, New York (2012)","DOI":"10.1145\/2335356.2335367"},{"key":"27_CR28","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1143120.1143129","volume-title":"ACM International Symposium on Usable Privacy and Security","author":"C. Kuo","year":"2006","unstructured":"Kuo, C., Romanosky, S., Cranor, L.: Human Selection of Mnemonic Phrase-based Passwords. In: ACM International Symposium on Usable Privacy and Security, pp. 67\u201378. ACM Press, New York (2006)"},{"key":"27_CR29","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1145\/1060745.1060815","volume-title":"ACM International Conference on World Wide Web","author":"J.A. Halderman","year":"2005","unstructured":"Halderman, J.A., Waters, B., Felten, E.: Convenient Method for Securely Managing Passwords. In: ACM International Conference on World Wide Web, pp. 471\u2013479. ACM Press, New York (2005)"},{"key":"27_CR30","first-page":"1","volume-title":"USENIX Security Symposium","author":"S. Chiasson","year":"2006","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.A.: Usability Study and Critique of Two Password Managers. In: USENIX Security Symposium, pp. 1\u201316. USENIX Association, Berkley (2006)"},{"key":"27_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9","volume-title":"The Adaptive Web: Methods and Strategies of Web Personalization","author":"P. Brusilovsky","year":"2007","unstructured":"Brusilovsky, P., Kobsa, A., Nejdl, W.: The Adaptive Web: Methods and Strategies of Web Personalization. Springer, Heidelberg (2007)"},{"key":"27_CR32","volume-title":"Mind and Its Evolution: A Dual Coding Theoretical Approach","author":"A. Paivio","year":"2006","unstructured":"Paivio, A.: Mind and Its Evolution: A Dual Coding Theoretical Approach. Lawrence, Erlbaum, Mahwah, NJ (2006)"},{"issue":"2","key":"27_CR33","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/0010-0285(73)90032-7","volume":"5","author":"A. Paivio","year":"1973","unstructured":"Paivio, A., Csapo, K.: Picture Superiority in Free Recall: Imagery or Dual Coding? J. Cognitive Psychology\u00a05(2), 176\u2013206 (1973)","journal-title":"J. Cognitive Psychology"},{"key":"27_CR34","volume-title":"Cognitive Psychology and its Implications","author":"J.R. Anderson","year":"2009","unstructured":"Anderson, J.R.: Cognitive Psychology and its Implications, 7th edn. Worth Publishers, NY (2009)","edition":"7"},{"key":"27_CR35","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.neuroimage.2006.11.023","volume":"35","author":"B.A. Ally","year":"2007","unstructured":"Ally, B.A., Budson, A.E.: The Worth of Pictures: Using High Density Event Related Potentials to Understand the Memorial Power of Pictures and the Dynamics of Recognition Memory. J. NeuroImage\u00a035, 378\u2013395 (2007)","journal-title":"J. NeuroImage"},{"issue":"38","key":"27_CR36","doi-asserted-by":"publisher","first-page":"14325","DOI":"10.1073\/pnas.0803390105","volume":"105","author":"T.F. Brady","year":"2008","unstructured":"Brady, T.F., Konkle, T., Alvarez, G.A., Oliva, A.: Visual Long-term Memory has a Massive Storage Capacity for Object Details. J. National Academy of Sciences\u00a0105(38), 14325\u201314329 (2008)","journal-title":"J. National Academy of Sciences"},{"key":"27_CR37","unstructured":"Oates, J.M., Reder, L.M.: Memory for Pictures: Sometimes a Picture is not Worth a Single Word. In: Successful Remembering and Successful Forgetting: A Festschrift in Honor of Robert A. Bjork, pp. 447\u2013462. J. Psychological Press (2010)"},{"issue":"14","key":"27_CR38","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.neuropsychologia.2007.06.021","volume":"45","author":"E.K. Robertson","year":"2007","unstructured":"Robertson, E.K., K\u00f6hler, S.: Insights from Child Development on the Relationship between Episodic and Semantic Memory. J. Neuropsychologia\u00a045(14), 3178\u20133189 (2007)","journal-title":"J. Neuropsychologia"},{"issue":"3-4","key":"27_CR39","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0144341910110301","volume":"11","author":"R. Riding","year":"1991","unstructured":"Riding, R., Cheema, I.: Cognitive Styles \u2013 An Overview and Integration. J. Educational Psychology\u00a011(3-4), 193\u2013215 (1991)","journal-title":"J. Educational Psychology"},{"issue":"4","key":"27_CR40","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.lindif.2009.06.003","volume":"19","author":"E. Peterson","year":"2009","unstructured":"Peterson, E., Rayner, S., Armstrong, S.: Researching the Psychology of Cognitive Style and Learning Style: Is There Really a Future? J. Learning and Individual Differences\u00a019(4), 518\u2013523 (2009)","journal-title":"J. Learning and Individual Differences"},{"issue":"5","key":"27_CR41","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1002\/acp.1473","volume":"23","author":"O. Blazhenkova","year":"2009","unstructured":"Blazhenkova, O., Kozhevnikov, M.: The New Object-Spatial-Verbal Cognitive Style Model: Theory and Measurement. J. Applied Cognitive Psychology\u00a023(5), 638\u2013663 (2009)","journal-title":"J. Applied Cognitive Psychology"},{"key":"27_CR42","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1016\/j.paid.2004.08.009","volume":"38","author":"E. Peterson","year":"2005","unstructured":"Peterson, E., Deary, I., Austin, E.: A New Reliable Measure of Verbal-Imagery Cognitive Style. J. Personality and Individual Differences\u00a038, 1269\u20131281 (2005)","journal-title":"J. Personality and Individual Differences"},{"key":"27_CR43","volume-title":"Cognitive Styles Analysis. Learning and Training Technology","author":"R. Riding","year":"2001","unstructured":"Riding, R.: Cognitive Styles Analysis. Learning and Training Technology. Birmingham, UK (2001)"},{"issue":"3","key":"27_CR44","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1037\/0033-2909.133.3.464","volume":"133","author":"M. Kozhevnikov","year":"2007","unstructured":"Kozhevnikov, M.: Cognitive Styles in the Context of Modern Psychology: Toward an Integrated Framework of Cognitive Style. J. Psychological Bulletin\u00a0133(3), 464\u2013481 (2007)","journal-title":"J. Psychological Bulletin"},{"key":"27_CR45","doi-asserted-by":"publisher","first-page":"191","DOI":"10.2190\/3515-8169-24J8-7157","volume":"26","author":"L.P. McAvinue","year":"2007","unstructured":"McAvinue, L.P., Robertson, I.H.: Measuring Visual Imagery Ability: A Review. J. Imagination, Cognition and Personality\u00a026, 191\u2013211 (2007)","journal-title":"J. Imagination, Cognition and Personality"},{"key":"27_CR46","first-page":"340","volume-title":"ACM International Conference of SIGCHI Australia on Computer-Human Interaction","author":"K. Kinley","year":"2010","unstructured":"Kinley, K., Tjondronegoro, D., Partridge, H.: Web Searching Interaction Model based on User Cognitive Styles. In: ACM International Conference of SIGCHI Australia on Computer-Human Interaction, pp. 340\u2013343. ACM Press, New York (2010)"},{"issue":"2","key":"27_CR47","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1086\/209558","volume":"26","author":"N. Tavassoli","year":"1999","unstructured":"Tavassoli, N.: Temporal and Associative Memory in Chinese and English. J. Consumer Research\u00a026(2), 170\u2013181 (1999)","journal-title":"J. Consumer Research"},{"issue":"1","key":"27_CR48","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2011.150","volume":"10","author":"C. Herley","year":"2012","unstructured":"Herley, C., van Oorschot, P.: A Research Agenda Acknowledging the Persistence of Passwords. J. Security and Privacy\u00a010(1), 28\u201336 (2012)","journal-title":"J. Security and Privacy"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40477-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T06:08:42Z","timestamp":1557986922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40477-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642404764","9783642404771"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40477-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}