{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:22:59Z","timestamp":1761060179268},"reference-count":65,"publisher":"Informa UK Limited","issue":"12","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1080\/10447318.2016.1220103","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T21:09:58Z","timestamp":1470431398000},"page":"975-988","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":12,"title":["Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication"],"prefix":"10.1080","volume":"32","author":[{"given":"Martin","family":"Mihajlov","sequence":"first","affiliation":[]},{"given":"Borka","family":"Jerman-Bla\u017ei\u010d","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Ciunova Shuleska","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,8,5]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"CIT0002"},{"key":"CIT0004","volume-title":"The CELEX lexical data base on CD-ROM","author":"Baayen R. H.","year":"1993"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.133.2.283"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_27"},{"key":"CIT0007","volume-title":"Basic color terms: Their university and evolution. Berkely, CA: University of California Press","author":"Berlin B.","year":"1991"},{"key":"CIT0008","first-page":"44","author":"Biddle R.","year":"2012","journal-title":"ACM Computing Surveys"},{"key":"CIT0009","volume-title":"Graphical Password. U.S. Patent 5559961","author":"Blonder G. E.","year":"1996"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1177\/0956797612465439"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.4.977"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1177\/000306518503300305"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/14640747308400325"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0080-7"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"CIT0029","unstructured":"Franck, K. (1946). Preferences for sex symbols and their personality correlates. Genetic Psychology Monographs 33, 73\u2013123."},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1037\/h0057315"},{"key":"CIT0033","volume-title":"Practical UNIX and Internet security","author":"Garfinkel S.","year":"2003"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0277(92)90040-O"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.907464"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195169669.001.0001"},{"key":"CIT0038","volume-title":"Tests for colour-deficiency","author":"Ishihara S.","year":"1987"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8295.1956.tb00571.x"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1080\/00220671.1994.9944823"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.7717\/peerj.444"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1037\/h0048317"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1006\/jmla.1997.2529"},{"key":"CIT0047","volume-title":"Computational analysis of present-day American English","author":"Kucera H.","year":"1967"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1037\/h0034633"},{"key":"CIT0049","volume-title":"Imagery, memory, and cognition: Essays in honor of Allan Paivio","author":"Madigan S.","year":"1983"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1093\/geront\/11.4_Part_1.311"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8295.1954.tb01246.x"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2011.93"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.2.5.523"},{"key":"CIT0056","unstructured":"Oates, J. M. & Reder, L. M. (2010). Memory for pictures: Sometimes a picture is not worth a single word (pp. 447\u2013462). J. Psychological Press."},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/17470216508416445"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.3758\/BF03331011"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.3758\/BF03197377"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186723"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.2174\/1875934300902010178"},{"key":"CIT0062","first-page":"41","volume-title":"Symbolic Functioning in Childhood","author":"Potter M. C.","year":"1979"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1038\/253437a0"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2009.026621"},{"key":"CIT0067","volume-title":"Girls Like Colors, Boys Like Action? Imagery Preferences and Gender","author":"Rogers P. L.","year":"1995"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(76)90013-X"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1080\/00393541.1979.11650232"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(67)80067-7"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1995.80.3.920"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1988.66.1.295"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.109.4.373"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.6.2.174"},{"key":"CIT0077","first-page":"2002","volume":"4","author":"Sobrado L.","year":"2002","journal-title":"The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research"},{"key":"CIT0079","volume-title":"Inkblot authentication","author":"Stubblefield A.","year":"2004"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1016\/0197-4556(85)90016-4"},{"key":"CIT0084","volume-title":"Tog on software design","author":"Tognazzini B.","year":"1996"},{"key":"CIT0086","volume-title":"Passdoodles: A lightweight authentication method","author":"Varenhorst C.","year":"2004"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"issue":"3","key":"CIT0089","first-page":"176","volume":"11","author":"Wijk H.","year":"1999","journal-title":"Aging (Milan, Italy)"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2011.654202"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1006\/jmla.2001.2834"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1136177"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/36.3.227"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2016.1220103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,14]],"date-time":"2016-12-14T10:42:59Z","timestamp":1481712179000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2016.1220103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,5]]},"references-count":65,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2016,10,26]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1080\/10447318.2016.1220103"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2016.1220103","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}