{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:57:00Z","timestamp":1764838620463,"version":"3.46.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,26]]},"DOI":"10.1109\/pst65910.2025.11268881","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:04Z","timestamp":1764787204000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Short Training Techniques to Enhance Usability of System-Assigned PINs"],"prefix":"10.1109","author":[{"given":"Israt Jahan","family":"Jui","sequence":"first","affiliation":[{"name":"Ontario Tech University"}]},{"given":"Amirali","family":"Salehi-Abari","sequence":"additional","affiliation":[{"name":"Ontario Tech University"}]},{"given":"Julie","family":"Thorpe","sequence":"additional","affiliation":[{"name":"Ontario Tech University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2600"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00047"},{"article-title":"Demographics of mobile device ownership and adoption in the united states - pew research center","year":"2021","author":"Center","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_3"},{"article-title":"RBC refuses to refund ontario woman $8,772 because of PIN \u2014 CTV news","year":"2022","author":"Davidson","key":"ref5"},{"article-title":"\u201cThe same PIN just longer\u201c: On the (in)security of upgrading PINs from 4 to 6 digits","volume-title":"Proceeding of the 31st USENIX Security Symposium","author":"Munyendo","key":"ref6"},{"article-title":"It\u2019s a hard lock life: a field study of smartphone (un)locking behavior and risk perception","volume-title":"Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS)","author":"Harbach","key":"ref7"},{"article-title":"Learning assigned secrets for unlocking mobile devices","volume-title":"Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS)","author":"Schechter","key":"ref8"},{"article-title":"On the memorability of system-generated PINs: Can chunking help?","volume-title":"Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Huh","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1006\/cogp.1998.0681"},{"year":"2012","key":"ref11","article-title":"PIN number analysis"},{"year":"2012","key":"ref12","article-title":"The most common PIN numbers: Is your bank account vulnerable? - debit cards"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379702"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470701"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2015.7359406"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23094"},{"article-title":"Towards reliable storage of 56-bit secrets in human memory","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Bonneau","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.115.2.163"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23292"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979323"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2594445"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243764"},{"key":"ref25","first-page":"59","article-title":"Contextual cueing","author":"Jiang","year":"2020","journal-title":"Spatial Learning and Attention Guidance"}],"event":{"name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","start":{"date-parts":[[2025,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2025,8,28]]}},"container-title":["2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268482\/11268814\/11268881.pdf?arnumber=11268881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:53:32Z","timestamp":1764838412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/pst65910.2025.11268881","relation":{},"subject":[],"published":{"date-parts":[[2025,8,26]]}}}