{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:52:31Z","timestamp":1725619951466},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,14]]},"DOI":"10.1145\/1182475.1182529","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"429-432","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Question-based authentication using context data"],"prefix":"10.1145","author":[{"given":"Ann","family":"Nosseir","sequence":"first","affiliation":[{"name":"University of Strathclyde, Glasgow, UK"}]},{"given":"Richard","family":"Connor","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, UK"}]},{"given":"Crawford","family":"Revie","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, UK"}]},{"given":"Sotirios","family":"Terzis","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, UK"}]}],"member":"320","published-online":{"date-parts":[[2006,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security Engineering","author":"Anderson R.","year":"2001","unstructured":"Anderson , R. Security Engineering , Wiley . UK. 2001 . Anderson, R. Security Engineering, Wiley. UK. 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.4324\/9780203345160","volume-title":"Essentials of Human Memory","author":"Baddeley A.","year":"1999","unstructured":"Baddeley , A. Essentials of Human Memory , Psychology Press Ltd , UK. 1999 . Baddeley, A. Essentials of Human Memory, Psychology Press Ltd, UK. 1999."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of The 1st International Workshop on Managing Interactions in Smart Environments","author":"Dey A. K.","year":"1999","unstructured":"Dey , A. K. et al. A Context-Based Infrastructure for Smart Environment , Proc. of The 1st International Workshop on Managing Interactions in Smart Environments , Dublin, Ireland , December , ( 1999 ) 114--128. Dey, A. K. et al. A Context-Based Infrastructure for Smart Environment, Proc. of The 1st International Workshop on Managing Interactions in Smart Environments, Dublin, Ireland, December, (1999) 114--128."},{"key":"e_1_3_2_1_5_1","volume-title":"9th Usenix Security Symposium","author":"Dhamija R.","year":"2000","unstructured":"Dhamija , R. , and Perrig , A . D\u00e9j\u00e0 Vu: A User Study Using Images for Authentication , 9th Usenix Security Symposium , Denver, CO, USA, 14-17th August, Proc. 9th Usenix Security Symposium. ( 2000 ) Dhamija, R., and Perrig, A. D\u00e9j\u00e0 Vu: A User Study Using Images for Authentication, 9th Usenix Security Symposium, Denver, CO, USA, 14-17th August, Proc. 9th Usenix Security Symposium. (2000)"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_1_7_1","volume-title":"G. D. Abowd et al. (Eds.): Proc. of the 3rd International Conference on Ubiquitous Computing","author":"Langheinrich M.","year":"2001","unstructured":"Langheinrich , M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , In: G. D. Abowd et al. (Eds.): Proc. of the 3rd International Conference on Ubiquitous Computing , Springer-Verlag Atlanta , USA , ( 2001 ) 273--291. Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, In: G. D. Abowd et al. (Eds.): Proc. of the 3rd International Conference on Ubiquitous Computing, Springer-Verlag Atlanta, USA, (2001) 273--291."},{"key":"e_1_3_2_1_8_1","volume-title":"Cook, D. & Das, S. (Eds","author":"Nixon P.","year":"1999","unstructured":"Nixon , P. et al. Managing interactions in: Smart environments , Cook, D. & Das, S. (Eds . ) Springer-Verlag , ( 1999 ) 220-- 243. Nixon, P. et al. Managing interactions in: Smart environments, Cook, D. & Das, S. (Eds.) Springer-Verlag, (1999) 220-- 243."},{"volume-title":"Workshop: Customer Focused Mobile Services, WWW 2005 Conference, Tokyo, Japan, 10-14th May, Proceedings of WWW 2005 SIGCHI. (2005)","author":"Nosseir A.","key":"e_1_3_2_1_9_1","unstructured":"Nosseir A. , Connor R. , and Dunlop M . Internet authentication based on personal history - A Feasibility Test . Workshop: Customer Focused Mobile Services, WWW 2005 Conference, Tokyo, Japan, 10-14th May, Proceedings of WWW 2005 SIGCHI. (2005) Nosseir A., Connor R., and Dunlop M. Internet authentication based on personal history - A Feasibility Test. Workshop: Customer Focused Mobile Services, WWW 2005 Conference, Tokyo, Japan, 10-14th May, Proceedings of WWW 2005 SIGCHI. (2005)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186723"},{"key":"e_1_3_2_1_11_1","volume-title":"http:\/\/www.realuser.com","author":"Real User Corporation","year":"2005","unstructured":"Real User Corporation ( 2005 ) http:\/\/www.realuser.com Real User Corporation (2005) http:\/\/www.realuser.com"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470848693","volume-title":"Security for Ubiquitous Computing","author":"Stajano F.","year":"2002","unstructured":"Stajano , F. Security for Ubiquitous Computing , WILEY : University of Cambridge , UK. 2002 Stajano, F. Security for Ubiquitous Computing, WILEY: University of Cambridge, UK. 2002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45233-1_26"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(86)90013-7"},{"key":"e_1_3_2_1_15_1","volume-title":"Scientific American","author":"Weiser M.","year":"1991","unstructured":"Weiser M. the Computer for the twenty-first century , Scientific American , September , ( 1991 ) 94--100. Weiser M. the Computer for the twenty-first century, Scientific American, September, (1991) 94--100."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"}],"event":{"name":"NORDICHI06: The 4th Nordic Conference on Human-Computer Interaction","acronym":"NORDICHI06","location":"Oslo Norway"},"container-title":["Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1182475.1182529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T02:03:22Z","timestamp":1673575402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1182475.1182529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,14]]},"references-count":16,"alternative-id":["10.1145\/1182475.1182529","10.1145\/1182475"],"URL":"https:\/\/doi.org\/10.1145\/1182475.1182529","relation":{},"subject":[],"published":{"date-parts":[[2006,10,14]]},"assertion":[{"value":"2006-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}