{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:58:15Z","timestamp":1729648695978,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859790","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1422-1427","source":"Crossref","is-referenced-by-count":1,"title":["Question based user authentication in commercial environments"],"prefix":"10.1109","author":[{"given":"K.","family":"Skracic","sequence":"first","affiliation":[]},{"given":"P.","family":"Pale","sequence":"additional","affiliation":[]},{"given":"B.","family":"Jeren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.02.004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.50"},{"key":"23","first-page":"20","article-title":"Banks move towards two-factor authentication","year":"2005","journal-title":"Comput Fraud Secur"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"},{"key":"24","first-page":"1116","article-title":"Knowledge based authentication requirements","author":"skracic","year":"2013","journal-title":"2013 36th International Convention on Information Communication Technology Electronics Microelectronics (MIPRO)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.06.006"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/539395"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953496"},{"key":"14","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1300\/J079v16n01_10","article-title":"Social network analysis","volume":"16","author":"calvin","year":"1992","journal-title":"Journal of Social Service Research"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408667"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1228175.1228223"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2013.6508205"},{"key":"3","first-page":"143","article-title":"Designing authentication systems with challenge questions","author":"just","year":"2005","journal-title":"Security and Usability Designing Secure Systems that People Can Use"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2010.5442151"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-03371-2_11"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220410530816"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397744"},{"key":"7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-32946-3_1","article-title":"Social authentication: Harder than it looks","volume":"7397","author":"kim","year":"2012","journal-title":"Financial Cryptography and Data Security"},{"key":"6","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/11496137_7","article-title":"Messin with texas deriving mothers maiden names using public records","author":"griffith","year":"2005","journal-title":"Proceedings of the Third International Conference on Applied Cryptography and Network Security"},{"key":"5","first-page":"109","article-title":"Profile based student authentication in online examination","author":"ullah","year":"2012","journal-title":"Inf Soc -Soc 2012 Int Conf"},{"key":"4","article-title":"Internet authentication based on personal history-a feasibility test","author":"nosseir","year":"2005","journal-title":"Proceedings of Customer Focused Mobile Services Workshop at WWW2005"},{"key":"9","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11957454_3","article-title":"Imagined communities: Awareness, information sharing, and privacy on the facebook","author":"acquisti","year":"2006","journal-title":"Proceedings of the 6th International Conference on Privacy Enhancing Technologies"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578005"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859790.pdf?arnumber=6859790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T04:19:34Z","timestamp":1649823574000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859790","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}