{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T16:35:30Z","timestamp":1746549330772},"reference-count":6,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/mic.2018.112101619","type":"journal-article","created":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T19:18:09Z","timestamp":1516130289000},"page":"62-70","source":"Crossref","is-referenced-by-count":5,"title":["Toward Accessible Authentication: Learning from People with Visual Impairments"],"prefix":"10.1109","volume":"22","author":[{"given":"Bryan","family":"Dosono","sequence":"first","affiliation":[{"name":"Syracuse University"}]},{"given":"Jordan","family":"Hayes","sequence":"additional","affiliation":[{"name":"Syracuse University"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Syracuse University"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/227614.227615"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"ref6","first-page":"151","article-title":"&#x2018;I'm stuck!&#x2019;: A contextual inquiry of people with visual impairments in authentication","author":"dosono","year":"0","journal-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)"},{"key":"ref5","author":"strauss","year":"1990","journal-title":"Basics of Qualitative Research Grounded Theory Procedures and Techniques"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878875"},{"key":"ref1","first-page":"7","article-title":"Authentication technologies for the blind or visually impaired","author":"saxena","year":"0","journal-title":"Proc Usenix Workshop Hot Topics in Security"}],"container-title":["IEEE Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4236\/8345553\/08259407.pdf?arnumber=8259407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T20:07:14Z","timestamp":1651781234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8259407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":6,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mic.2018.112101619","relation":{},"ISSN":["1089-7801","1941-0131"],"issn-type":[{"value":"1089-7801","type":"print"},{"value":"1941-0131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}