{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:43:51Z","timestamp":1725669831932},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596062","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"267-274","source":"Crossref","is-referenced-by-count":7,"title":["Writing down your password: Does it help?"],"prefix":"10.1109","author":[{"given":"Vanessa","family":"Boothroyd","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.007"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"4","article-title":"A usability study and critique of two password managers","author":"chiasson","year":"2006","journal-title":"USENIX Security Symposium"},{"journal-title":"Write Down Your Password in 'Schneier on Security","year":"2005","author":"schneier","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"11","article-title":"NIST special publication 800-63: Electronic authentication guideline","author":"burr","year":"2006","journal-title":"National Institute of Standards and Technology NISTIR"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596062.pdf?arnumber=6596062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T16:35:01Z","timestamp":1490200501000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596062","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}