{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:59Z","timestamp":1729616699638,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122786","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"7-12","source":"Crossref","is-referenced-by-count":1,"title":["Multifactor graphical passwords: An assessment of end-user performance"],"prefix":"10.1109","author":[{"given":"M. Z.","family":"Jali","sequence":"first","affiliation":[]},{"given":"S. M.","family":"Furnell","sequence":"additional","affiliation":[]},{"given":"P. S.","family":"Dowland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"A shoulder-surfing resistant graphical password scheme - WIW","author":"man","year":"0","journal-title":"International Conference on Security and Management Las Vegas USA 2003"},{"key":"2","article-title":"PassImages: An alternative method of user authentication","author":"charruau","year":"0","journal-title":"ISOneWorld 2005 Las Vegas USA March 30 - April 1 2005"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280682"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2008.92"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2008.40"},{"key":"4","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/11613022_28","article-title":"A User authentication system using schema of visual memory","volume":"3853","author":"harada","year":"2006","journal-title":"LNCS Biologically Inspired Approaches to Advanced Information Technology"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057036"},{"key":"8","first-page":"1","article-title":"On user choice in graphical password schemes","author":"davis","year":"0","journal-title":"Proceedings of the 13th USENIX Security Symposium California USA August 9-13 USENIX 2004"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011035250"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122786.pdf?arnumber=6122786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:58Z","timestamp":1497947818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122786","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}