{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:00:59Z","timestamp":1760346059935,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T00:00:00Z","timestamp":1216771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,23]]},"DOI":"10.1145\/1408664.1408668","type":"proceedings-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T21:44:44Z","timestamp":1220564684000},"page":"24-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Securing passfaces for description"],"prefix":"10.1145","author":[{"given":"Paul","family":"Dunphy","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle, UK"}]},{"given":"James","family":"Nicholson","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, UK"}]},{"given":"Patrick","family":"Olivier","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, UK"}]}],"member":"320","published-online":{"date-parts":[[2008,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","volume-title":"Graphical Passwords","author":"Blonder G.","year":"1996","unstructured":"G. Blonder . United States Patent 5559961 , Graphical Passwords , 1996 . G. Blonder. United States Patent 5559961, Graphical Passwords, 1996."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium","author":"Chiasson S.","year":"2006","unstructured":"S. Chiasson , P. C. van Oorschot , and R. Biddle . A usability study and critique of two password managers . In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium , pages 1 -- 1 , Berkeley, CA, USA , 2006 . USENIX Association. S. Chiasson, P. C. van Oorschot, and R. Biddle. A usability study and critique of two password managers. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 1--1, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_5_1","volume-title":"Visual Code Recordal and Communication Thereof International Patent PCT\/GB1999\/001688","author":"Davies J.","year":"1999","unstructured":"J. Davies . Visual Code Recordal and Communication Thereof International Patent PCT\/GB1999\/001688 , 1999 . J. Davies. Visual Code Recordal and Communication Thereof International Patent PCT\/GB1999\/001688, 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251386"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251386"},{"key":"e_1_3_2_1_8_1","first-page":"253","volume-title":"Contemporary Ergonomics","author":"Angeli A. De","year":"2003","unstructured":"A. De Angeli , L. Coventry , G. Johnson , and M. Coutts . Usability and user authentication: Pictorial passwords vs. pin . In McCabe, P. T. (Ed.), Contemporary Ergonomics 2003 ., pages 253 -- 258 . Taylor &amp; Francis. London , 2003. A. De Angeli, L. Coventry, G. Johnson, and M. Coutts. Usability and user authentication: Pictorial passwords vs. pin. In McCabe, P. T. (Ed.), Contemporary Ergonomics 2003., pages 253--258. Taylor &amp; Francis. London, 2003."},{"key":"e_1_3_2_1_9_1","first-page":"4","volume-title":"SSYM'00: Proceedings of the 9th conference on USENIX Security Symposium","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . D\u00e9j\u00e0 Vu: a user study using images for authentication . In SSYM'00: Proceedings of the 9th conference on USENIX Security Symposium , pages 4 -- 4 , Berkeley, CA, USA , 2000 . USENIX Association. R. Dhamija and A. Perrig. D\u00e9j\u00e0 Vu: a user study using images for authentication. In SSYM'00: Proceedings of the 9th conference on USENIX Security Symposium, pages 4--4, Berkeley, CA, USA, 2000. USENIX Association."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"e_1_3_2_1_11_1","volume-title":"Language development","author":"Horgan D. M.","year":"1975","unstructured":"D. M. Horgan . Language development . University of Michigan doctoral dissertation , 1975 . D. M. Horgan. Language development. University of Michigan doctoral dissertation, 1975."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280710"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.4324\/9781410605290","volume-title":"Sex Differences in Cognitive Abilities","author":"Halpern D. F.","year":"2000","unstructured":"D. F. Halpern . Sex Differences in Cognitive Abilities . Lawrence Erlbaum , 3 edition, 2000 . D. F. Halpern. Sex Differences in Cognitive Abilities. Lawrence Erlbaum, 3 edition, 2000."},{"key":"e_1_3_2_1_14_1","first-page":"236","volume-title":"Developmental Psychology","author":"Huttenlocher J.","unstructured":"J. Huttenlocher , W. Haight , A. Bryk , M. Seltzer , and T. Lyons . Early Vocabulary growth:Relation to Language Input and Gender . In Developmental Psychology , volume 27 , pages 236 -- 248 . J. Huttenlocher, W. Haight, A. Bryk, M. Seltzer, and T. Lyons. Early Vocabulary growth:Relation to Language Input and Gender. In Developmental Psychology, volume 27, pages 236--248."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium","author":"Jermyn Ian","year":"1999","unstructured":"Ian Jermyn and Alain Mayer and Fabian Monrose and Michael K . Reiter and Aviel D. Rubin. The design and analysis of graphical passwords . In SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium , pages 1 -- 1 , Berkeley, CA, USA , 1999 . USENIX Association. Ian Jermyn and Alain Mayer and Fabian Monrose and Michael K. Reiter and Aviel D. Rubin. The design and analysis of graphical passwords. In SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium, pages 1--1, Berkeley, CA, USA, 1999. USENIX Association."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.005"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280696"},{"key":"e_1_3_2_1_18_1","unstructured":"Passfaces Corporation. The Science Behind Passfaces.  Passfaces Corporation. The Science Behind Passfaces."},{"key":"e_1_3_2_1_19_1","unstructured":"Passfaces Corporation: http:\/\/www.passfaces.com.  Passfaces Corporation: http:\/\/www.passfaces.com."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_21_1","unstructured":"SearchSecurity.com - http:\/\/searchsecurity.techtarget.com\/news\/article\/0 289142 sid14_gci895483 00.html. Employees willing to share passwords with strangers (2003) last accessed 23\/02\/2008.  SearchSecurity.com - http:\/\/searchsecurity.techtarget.com\/news\/article\/0 289142 sid14_gci895483 00.html. Employees willing to share passwords with strangers (2003) last accessed 23\/02\/2008."},{"key":"e_1_3_2_1_22_1","unstructured":"Searchsecurity.com - http:\/\/searchsecurity.techtarget.com\/news\/article\/0 289142 sid14_ gci902867 00.html. Most workers must remember 6 passwords or more (2003) last accessed 23\/02\/2008.  Searchsecurity.com - http:\/\/searchsecurity.techtarget.com\/news\/article\/0 289142 sid14_ gci902867 00.html. Most workers must remember 6 passwords or more (2003) last accessed 23\/02\/2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90027-7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_1_25_1","volume-title":"Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In 16th USENIX Security Symposium, Aug. 6--10","author":"Thorpe J.","year":"2007","unstructured":"J. Thorpe and P. V. Oorschott . Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In 16th USENIX Security Symposium, Aug. 6--10 , 2007 . J. Thorpe and P. V. Oorschott. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In 16th USENIX Security Symposium, Aug. 6--10, 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/36.3.227"}],"event":{"name":"SOUPS '08: The fourth Symposium on Usable Privacy and Security","acronym":"SOUPS '08","location":"Pittsburgh Pennsylvania USA"},"container-title":["Proceedings of the 4th symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1408664.1408668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:44Z","timestamp":1750255064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,23]]},"references-count":29,"alternative-id":["10.1145\/1408664.1408668","10.1145\/1408664"],"URL":"https:\/\/doi.org\/10.1145\/1408664.1408668","relation":{},"subject":[],"published":{"date-parts":[[2008,7,23]]},"assertion":[{"value":"2008-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}