{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:50:24Z","timestamp":1759092624174,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,6]],"date-time":"2008-04-06T00:00:00Z","timestamp":1207440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4,6]]},"DOI":"10.1145\/1357054.1357087","type":"proceedings-article","created":{"date-parts":[[2008,4,8]],"date-time":"2008-04-08T16:27:59Z","timestamp":1207672079000},"page":"197-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Love and authentication"],"prefix":"10.1145","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA, USA"}]},{"given":"Erik","family":"Stolterman","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Liu","family":"Yang","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,4,6]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1111\/j.1745-459X.2006.00076.x"},{"unstructured":"http:\/\/www.bowwow.com.au\/top20\/index.asp.  http:\/\/www.bowwow.com.au\/top20\/index.asp.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1080\/00222216.1986.11969649"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"18","article-title":"Messin' with Texas","volume":"8","author":"Griffith V.","year":"2007","unstructured":"V. Griffith and M. Jakobsson . Messin' with Texas , Deriving Mother's Maiden Names Using Public Records. RSA CryptoBytes , 8 ( 1 ): 18 -- 28 , 2007 . V. Griffith and M. Jakobsson. Messin' with Texas, Deriving Mother's Maiden Names Using Public Records. RSA CryptoBytes, 8(1):18--28, 2007.","journal-title":"Deriving Mother's Maiden Names Using Public Records. RSA CryptoBytes"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1080\/00224545.1939.9713344"},{"unstructured":"Oracle Identity Management. http:\/\/www.oracle.com\/ technology\/products\/oid\/oidhtml\/sec_idm_ training\/%html_masters\/c_page07.htm.  Oracle Identity Management. http:\/\/www.oracle.com\/ technology\/products\/oid\/oidhtml\/sec_idm_ training\/%html_masters\/c_page07.htm.","key":"e_1_3_2_1_6_1"},{"unstructured":"http:\/\/www.voiceport.net\/PasswordReset.aspx.  http:\/\/www.voiceport.net\/PasswordReset.aspx.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"71","volume-title":"USENIX Security","author":"Staddon J.","year":"2007","unstructured":"J. Staddon , P. Golle , and B. Zimny . Web-based Inference Detection . In USENIX Security , pages 71 -- 86 , Boston, USA , August 2007 . J. Staddon, P. Golle, and B. Zimny. Web-based Inference Detection. In USENIX Security, pages 71--86, Boston, USA, August 2007."},{"key":"e_1_3_2_1_9_1","volume-title":"Vol 85(3, Pt 1):883--896","author":"Stamps A. E. I.","year":"1997","unstructured":"A. E. I. Stamps . Of Time and Preference: Temporal Stability of Environmental Preferences. Perceptual and Motor Skills , Vol 85(3, Pt 1):883--896 , December 1997 . A. E. I. Stamps. Of Time and Preference: Temporal Stability of Environmental Preferences. Perceptual and Motor Skills, Vol 85(3, Pt 1):883--896, December 1997."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/526899"},{"unstructured":"Pennkey Challenge-response Password Reset Authenticating (Identifying) Yourself. https:\/\/galaxy.isc-seo.upenn.edu:7778\/pls\/com8i\/Challenge_Controller_pg. Start_Challenge.  Pennkey Challenge-response Password Reset Authenticating (Identifying) Yourself. https:\/\/galaxy.isc-seo.upenn.edu:7778\/pls\/com8i\/Challenge_Controller_pg. Start_Challenge.","key":"e_1_3_2_1_11_1"},{"unstructured":"RSA Identity Verification from Verid. http:\/\/www.rsa.com\/node.aspx?id=3347.  RSA Identity Verification from Verid. http:\/\/www.rsa.com\/node.aspx?id=3347.","key":"e_1_3_2_1_12_1"},{"unstructured":"http:\/\/www.zazzle.com\/.  http:\/\/www.zazzle.com\/.","key":"e_1_3_2_1_13_1"}],"event":{"sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CHI '08","name":"CHI '08: CHI Conference on Human Factors in Computing Systems","location":"Florence Italy"},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1357054.1357087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1357054.1357087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:24Z","timestamp":1750254984000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1357054.1357087"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,6]]},"references-count":13,"alternative-id":["10.1145\/1357054.1357087","10.1145\/1357054"],"URL":"https:\/\/doi.org\/10.1145\/1357054.1357087","relation":{},"subject":[],"published":{"date-parts":[[2008,4,6]]},"assertion":[{"value":"2008-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}