{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T23:33:40Z","timestamp":1649201620963},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2012,6,15]],"date-time":"2012-06-15T00:00:00Z","timestamp":1339718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s11623-012-0167-6","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T05:04:15Z","timestamp":1348635855000},"page":"497-501","source":"Crossref","is-referenced-by-count":0,"title":["Usability gesichtserkennungsbasierter Authentifizierung"],"prefix":"10.1007","volume":"36","author":[{"given":"Thomas","family":"Fenzl","sequence":"first","affiliation":[]},{"given":"Christian","family":"Kollmitzer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,15]]},"reference":[{"key":"167_CR1","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/s11623-010-0205-1","volume":"11\/2010","author":"S. Rass","year":"2010","unstructured":"S. Rass, and P. Schartner. Quantenkryptographie. \u00dcberblick und aktuelle Entwicklungen. DuD Datenschutz und Datensicherheit. 11\/2010:753\u2013757, 2010.","journal-title":"DuD Datenschutz und Datensicherheit"},{"key":"167_CR2","unstructured":"X. Suo, Y. Zhu, and G.S. Owen. Graphical Passwords: a survey. 21st Annual Conference on Computer Security Applications, 10 pp., 2005."},{"key":"167_CR3","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"C.E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27: 623\u2013656, 1948.","journal-title":"Bell System Technical Journal"},{"key":"167_CR4","unstructured":"S. Rass, D. Schuller and C. Kollmitzer. Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentification. In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security \u2014 CMS\u2019 2010, Springer Lecture Notes of Computer Science, 6109:166\u2013177, 2010."},{"key":"167_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.paid.2010.02.031","volume":"49","author":"G.R. Franklin Jr.","year":"2010","unstructured":"G.R. Franklin Jr. and R.B. Adams Jr. What makes a face memorable? The relationship between face memory and emotional state reasoning. Personality and Individual Differences, 49:8\u201312, 2010.","journal-title":"Personality and Individual Differences"},{"key":"167_CR6","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1037\/a0019972","volume":"2","author":"O. Wilhelm","year":"2010","unstructured":"O. Wilhelm, G. Herzmann, O. Kunina, V. Danthiir, A. Schacht and W. Sommer. Individual Differences in Perceiving and Recognizing Faces \u2014 One Element of Social Cognition. Journal of Personality and Social Psychology, 2:530\u2013548, 2010.","journal-title":"Journal of Personality and Social Psychology"},{"key":"167_CR7","first-page":"94","volume":"35","author":"K.M. Curby","year":"2009","unstructured":"K.M. Curby and K. Glazek. A Visual Short-Term Memory Advantage for Objects of Expertise. Journal of Experimental Psychology, 35:94\u2013107, 2009.","journal-title":"Journal of Experimental Psychology"},{"key":"167_CR8","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1111\/j.1745-6924.2009.01119.x","volume":"4","author":"O. Pascalis","year":"2009","unstructured":"O. Pascalis and D.J. Kelly. The origins of face processing in humans: Phylogeny and ontogeny. Perspectives on Psychological Science, 4:200\u2013209, 2009.","journal-title":"Perspectives on Psychological Science"},{"key":"167_CR9","doi-asserted-by":"publisher","first-page":"2620","DOI":"10.1016\/j.neuropsychologia.2010.04.034","volume":"48","author":"G. V. Belle","year":"2010","unstructured":"G. Van Belle, P. Graef, K. Verfaillie, T. Busigny and B. Rossion. Whole not hole: Expert face recognition requires holistic perception. Neuropsychologia, 48:2620\u20132629, 2010.","journal-title":"Neuropsychologia"},{"issue":"10","key":"167_CR10","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1162\/jocn.2009.21346","volume":"22","author":"L.R. Betts","year":"2010","unstructured":"L.R. Betts and H.R. Wilsons. Heterogeneous structure in face-selective human occipito-temporal cortex. Journal of Cognitive Neuroscience, 22(10):2276\u20132288, 2010.","journal-title":"Journal of Cognitive Neuroscience"},{"key":"167_CR11","doi-asserted-by":"crossref","unstructured":"J. M. Henderson, R. Falk, S. Minut, F. C. Dyer and S. Mahadevan. Gaze Control for Face Learning and Recognition by Humans and Machines. Technical Report, Michigan State University Eye Movement Laboratory, 2000.","DOI":"10.1016\/S0166-4115(01)80034-0"},{"key":"167_CR12","volume-title":"Mirrors in the brain: How our minds share action and emotions","author":"G. Rizzolatti","year":"2006","unstructured":"G. Rizzolatti and C. Sinigaglia. Mirrors in the brain: How our minds share action and emotions. New York: Oxford University Press Inc., 2006."},{"issue":"3","key":"167_CR13","first-page":"619","volume":"36","author":"Y. Ma","year":"2010","unstructured":"Y. Ma and S. Han. Human Perception and Performance: Why we respond faster to the self than to others? Journal of Experimental Psychology, 36(3):619\u2013633, 2010.","journal-title":"Journal of Experimental Psychology"},{"issue":"6","key":"167_CR14","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.3758\/BF03193209","volume":"33","author":"A.C. Lamont","year":"2005","unstructured":"A.C. Lamont, S. Stewart-Williams and J. Podd. Face recognition and aging: Effects of target age and memory load. Memory & Cognition, 33(6):1017\u20131024, 2005.","journal-title":"Memory & Cognition"},{"key":"167_CR15","doi-asserted-by":"publisher","first-page":"2973","DOI":"10.1016\/j.neuropsychologia.2008.06.007","volume":"46","author":"H. Wiese","year":"2008","unstructured":"H. Wiese, S.R. Schweinberger and K. Hansen. The age of the beholder: ERP evidence of an own-age bias in face memory. Neuropsychologia, 46:2973\u20132985, 2008.","journal-title":"Neuropsychologia"},{"key":"167_CR16","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.brainresbull.2004.03.010","volume":"63","author":"A. Cellerino","year":"2004","unstructured":"A. Cellerino, D. Borghetti and F. Sartucci. Sex differences in face gender recognition in humans. Brain Research Bulletin, 63:443\u2013449, 2004.","journal-title":"Brain Research Bulletin"},{"issue":"7","key":"167_CR17","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1111\/j.1467-9280.2007.01949.x","volume":"18","author":"E. Awh","year":"2007","unstructured":"E. Awh, B. Barton and K.E. Vogel. Visual Working Memory represents a fixed Number of Items Regardless of Complexity. Psychological Science, 18(7):622\u2013628, 2007.","journal-title":"Psychological Science"},{"key":"167_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1177\/1558689806298224","volume":"1","author":"B.R. Johnson","year":"2007","unstructured":"B.R. Johnson, A.J. Onwuegbuzie and L.A. Turner. Toward a Definition of Mixed Methods Research. Journal of Mixed Methods Research., 1:112\u2013133, 2007.","journal-title":"Journal of Mixed Methods Research."},{"key":"167_CR19","volume-title":"Mixed methodology in psychological research","year":"2007","unstructured":"P. Mayring, G.L. Huber, L. G\u00fcrtler, and M. Kiegelmann (Hrsg.). Mixed methodology in psychological research. Rotterdam: Sense Publishers, 2007."},{"key":"167_CR20","volume-title":"Experteninterviews und qualitative Inhaltsanalyse: Als Instrumente rekonstruierender Untersuchungen","author":"J. Glaser","year":"2009","unstructured":"J. Glaser and G. Laudel. Experteninterviews und qualitative Inhaltsanalyse: Als Instrumente rekonstruierender Untersuchungen. (3.Aufl.) Wiesbaden: VS, 2009.","edition":"(3.Aufl.)"},{"key":"167_CR21","volume-title":"Qualitative Inhaltsanalyse. Grundlagen und Techniken","author":"P. Mayring","year":"2010","unstructured":"P. Mayring. Qualitative Inhaltsanalyse. Grundlagen und Techniken. (11. Aufl.) Weinheim: Beltz, 2010.","edition":"(11. Aufl.)"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0167-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0167-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0167-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0167-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T06:16:37Z","timestamp":1562220997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0167-6"}},"subtitle":["Ergebnisse eines Feldtests"],"short-title":[],"issued":{"date-parts":[[2012,6,15]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["167"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0167-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,15]]}}}