{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:51:33Z","timestamp":1648601493427},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T00:00:00Z","timestamp":1525046400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11623-018-0946-9","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T02:47:37Z","timestamp":1525056457000},"page":"307-310","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte"],"prefix":"10.1007","volume":"42","author":[{"given":"Peter","family":"Mayer","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Kunz","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,30]]},"reference":[{"key":"946_CR1","first-page":"301","volume-title":"In Annual Computer Security Applications Conference. ACM","author":"A J Aviv","year":"2015","unstructured":"Adam J Aviv, Devon Budzitowski, and Ravi Kuber. Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android\u2019s Pattern Unlock. In Annual Computer Security Applications Conference. ACM, 2015, 301\u2013310."},{"issue":"2","key":"946_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TDSC.2011.55","volume":"9","author":"S Chiasson","year":"2012","unstructured":"S Chiasson, E Stobert, A Forget, R Biddle, and P C van Oorschot. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism. IEEE Transactions on Dependable and Secure Computing 9, 2 (2012), 222\u2013235.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"946_CR3","first-page":"1","volume-title":"In USENIX Security Symposium","author":"S Chiasson","year":"2006","unstructured":"Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. A Usability Study and Critique of Two Password Managers. In USENIX Security Symposium, 2006, 1\u201316."},{"key":"946_CR4","volume-title":"In European Workshop on Usable Security","author":"V Kothari","year":"2017","unstructured":"Vijay Kothari, Ross Koppel, Jim Blythe, and Sean Smith. Password Logbooks and What Their Amazon Reviews Reveal About Their Users\u2019 Motivations, Beliefs, and Behaviors. In European Workshop on Usable Security, 2017."},{"key":"946_CR5","first-page":"465","volume-title":"In USENIX Security Symposium","author":"Z Li","year":"2014","unstructured":"Zhiwei Li, Warren He, Devdatta Akhawe, and Dawn Song. The Emperor\u2019s New Password Manager: Security Analysis of Web-based Password Managers. In USENIX Security Symposium, 2014. 465\u2013479."},{"key":"946_CR6","first-page":"89","volume-title":"In Annual Computer Security Applications Conference","author":"D McCarney","year":"2012","unstructured":"Daniel McCarney, David Barrera, Jeremy Clark, Sonia Chiasson, and Paul C van Oorschot. Tapas: design, implementation, and usability evaluation of a password manager. In Annual Computer Security Applications Conference, 2012. 89\u201398."},{"key":"946_CR7","volume-title":"Die Passwortkarte","author":"R Muth","year":"2013","unstructured":"Reinhard Muth. Die Passwortkarte. https:\/\/www.dsin-blog.de\/2013\/08\/20\/die-passwortkarte\/. (2013). Accessed: 2017-06-21."},{"key":"946_CR8","volume-title":"In Symposium on Usable Privacy and Security","author":"E Stobert","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle. The Password Life Cycle: User Behaviour in Managing Passwords. In Symposium on Usable Privacy and Security, 2014."},{"key":"946_CR9","unstructured":"Verizon. 2017 Data Breach Investigations Report."},{"key":"946_CR10","doi-asserted-by":"crossref","unstructured":"Andreas D\u00e4hn. Kennwortkarten. In Datenschutz und Datensicherheit (DuD), 10\/2015, S. 692\u2013695.","DOI":"10.1007\/s11623-015-0500-y"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0946-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0946-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0946-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T12:40:15Z","timestamp":1556628015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0946-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,30]]},"references-count":10,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["946"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0946-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,30]]},"assertion":[{"value":"30 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}