{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:24:53Z","timestamp":1730291093148,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890941","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:43:34Z","timestamp":1410363814000},"page":"207-214","source":"Crossref","is-referenced-by-count":2,"title":["A study of mnemonic image passwords"],"prefix":"10.1109","author":[{"given":"Soumyadeb","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Ron","family":"Poet","sequence":"additional","affiliation":[]},{"given":"Lewis","family":"Mackenzie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408668"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"journal-title":"Pass-Go A New Graphical Password Scheme","year":"2006","author":"tao","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470701"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CONGRESS.2009.10"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_26"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"10","first-page":"887","article-title":"Pictures at the ATM-Exploring the usability of multiple graphical passwords","author":"moncur","year":"2007","journal-title":"CHI"},{"key":"7","article-title":"Human Memory: A proposed system and its control processes","author":"atinkson","year":"1968","journal-title":"Psychology of Learning and Motivation"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"key":"5","article-title":"Deja vu: A user study using images for authentication","author":"dhamija","year":"2000","journal-title":"USENIX Security Symposium"},{"key":"4","article-title":"On user choice in graphical password schemes","volume":"13","author":"davis","year":"2004","journal-title":"12th USENIX Security Symposium"},{"key":"9","first-page":"66","article-title":"Optimising cue effectiveness","volume":"12","author":"mantyla","year":"1986","journal-title":"Journal of Experimental Psychology Learning Memory and Cognition"},{"key":"8","article-title":"Picture memory","author":"madigan","year":"1983","journal-title":"Imagery Memory and Cognition Essays in Honor of Allan Paivio"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890941.pdf?arnumber=6890941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:16:58Z","timestamp":1490293018000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890941","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}