{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:02:07Z","timestamp":1776783727754,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T00:00:00Z","timestamp":1216771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,23]]},"DOI":"10.1145\/1408664.1408667","type":"proceedings-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T21:44:44Z","timestamp":1220564684000},"page":"13-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":106,"title":["Personal knowledge questions for fallback authentication"],"prefix":"10.1145","author":[{"given":"Ariel","family":"Rabkin","sequence":"first","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2008,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Maltego. Available online: http:\/\/www.paterva.com\/maltego\/.  Maltego. Available online: http:\/\/www.paterva.com\/maltego\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Adaptive Challenge Questions Algorithm in Password Reset\/Recovery. In First International Workshop on Security for Spontaneous Interaction: IWISSI '07","author":"Asgharpour F.","year":"2007"},{"key":"e_1_3_2_1_3_1","unstructured":"J. Chao. Trend in canine names reflects the times. San Francisco Examiner page B1 Oct 12 1997.  J. Chao. Trend in canine names reflects the times. San Francisco Examiner page B1 Oct 12 1997."},{"key":"e_1_3_2_1_4_1","unstructured":"Facebook. Statistics. http:\/\/www.facebook.com\/press\/info.php?statistics.  Facebook. Statistics. http:\/\/www.facebook.com\/press\/info.php?statistics."},{"key":"e_1_3_2_1_5_1","volume-title":"Web 2.0 Security and Privacy","author":"Felt A.","year":"2008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315292"},{"key":"e_1_3_2_1_7_1","volume-title":"Berkman Center Research Publication","author":"Frieder L.","year":"2006"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(91)90005-T"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357087"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.80"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600178"},{"key":"e_1_3_2_1_14_1","first-page":"r122","article-title":"Health Department Announces Most Popular Dog Names and Breeds of 2005","author":"NYC Department of Health.","year":"2006","journal-title":"Available online: http:\/\/www.nyc.gov\/html\/doh\/html\/pr"},{"key":"e_1_3_2_1_15_1","unstructured":"Office of the Privacy Commissioner of Canada. \"Guidelines for Identification and Authentication\". Available Online. http:\/\/www.privcom.gc.ca\/information\/guide\/auth_061013_e.asp October 2006.  Office of the Privacy Commissioner of Canada. \"Guidelines for Identification and Authentication\". Available Online. http:\/\/www.privcom.gc.ca\/information\/guide\/auth_061013_e.asp October 2006."},{"key":"e_1_3_2_1_16_1","volume-title":"Financial Cryptography: 8th International Conference, FC","author":"O'Gorman L.","year":"2004"},{"key":"e_1_3_2_1_17_1","unstructured":"L. Saad. Lincoln Resumes Position as Americans' Top-Rated President. Available online: http:\/\/www.gallup.com\/poll\/26608\/Lincoln-Resumes-Position-Americans-TopRated-President.aspx February 19 2007.  L. Saad. Lincoln Resumes Position as Americans' Top-Rated President. Available online: http:\/\/www.gallup.com\/poll\/26608\/Lincoln-Resumes-Position-Americans-TopRated-President.aspx February 19 2007."},{"key":"e_1_3_2_1_18_1","unstructured":"Social Security Administration. \"Identity Theft and Your Social Security Number\". SSA Publication No. 05-10064. Available online: http:\/\/www.socialsecurity.gov\/pubs\/10064.html October 2007.  Social Security Administration. \"Identity Theft and Your Social Security Number\". SSA Publication No. 05-10064. Available online: http:\/\/www.socialsecurity.gov\/pubs\/10064.html October 2007."},{"key":"e_1_3_2_1_19_1","unstructured":"Social Security Administration. RSA Identity Verification. Available online. http:\/\/www.rsa.com\/node.aspx?id=3347 2008.  Social Security Administration. RSA Identity Verification. Available online. http:\/\/www.rsa.com\/node.aspx?id=3347 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"Social Security Administration. The SSN Numbering Scheme. Available online. http:\/\/www.socialsecurity.gov\/history\/ssn\/geocard.html Not Dated.  Social Security Administration. The SSN Numbering Scheme. Available online. http:\/\/www.socialsecurity.gov\/history\/ssn\/geocard.html Not Dated."}],"event":{"name":"SOUPS '08: The fourth Symposium on Usable Privacy and Security","location":"Pittsburgh Pennsylvania USA","acronym":"SOUPS '08"},"container-title":["Proceedings of the 4th symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1408664.1408667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:44Z","timestamp":1750255064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408667"}},"subtitle":["security questions in the era of Facebook"],"short-title":[],"issued":{"date-parts":[[2008,7,23]]},"references-count":20,"alternative-id":["10.1145\/1408664.1408667","10.1145\/1408664"],"URL":"https:\/\/doi.org\/10.1145\/1408664.1408667","relation":{},"subject":[],"published":{"date-parts":[[2008,7,23]]},"assertion":[{"value":"2008-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}