{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:49Z","timestamp":1771701229830,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T00:00:00Z","timestamp":1216771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,23]]},"DOI":"10.1145\/1408664.1408670","type":"proceedings-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T21:44:44Z","timestamp":1220564684000},"page":"35-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":101,"title":["Use Your Illusion"],"prefix":"10.1145","author":[{"given":"Eiji","family":"Hayashi","sequence":"first","affiliation":[{"name":"CMU\/CyLab Japan"}]},{"given":"Rachna","family":"Dhamija","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"CMU\/CyLab Japan"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"CMU\/CyLab"}]}],"member":"320","published-online":{"date-parts":[[2008,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Flickr. http:\/\/www.flickr.com.  Flickr. http:\/\/www.flickr.com."},{"key":"e_1_3_2_1_2_1","volume-title":"The Economist","year":"2006","unstructured":"Phoney finance. The Economist . October 26, 2006 . http:\/\/www.economist.com\/finance\/displaystory.cfm?story_id=8089667. Phoney finance. The Economist. October 26, 2006. http:\/\/www.economist.com\/finance\/displaystory.cfm?story_id=8089667."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168615"},{"key":"e_1_3_2_1_4_1","volume-title":"United states patent","author":"Blonder G.","year":"1996","unstructured":"G. Blonder . United states patent , 1996 . United States Patent 5559961. G. Blonder. United states patent, 1996. United States Patent 5559961."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03212900"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.00144"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. 9th USENIX Security Symp.","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . D\u00e9j\u00e0 vu: A user study, using images for authentication . In Proc. 9th USENIX Security Symp. , Aug. 2000 . R. Dhamija and A. Perrig. D\u00e9j\u00e0 vu: A user study, using images for authentication. In Proc. 9th USENIX Security Symp., Aug. 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03212641"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.13"},{"key":"e_1_3_2_1_12_1","volume-title":"The Intelligent Eye","author":"Gregory R. L.","year":"1970","unstructured":"R. L. Gregory . The Intelligent Eye . 1970 . R. L. Gregory. The Intelligent Eye. 1970."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11613022_28"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.718"},{"key":"e_1_3_2_1_15_1","volume-title":"Beyond Photography: The Digital Darkroom","author":"Holzmann G. J.","year":"1988","unstructured":"G. J. Holzmann . Beyond Photography: The Digital Darkroom . Prentice Hall , June 1988 . G. J. Holzmann. Beyond Photography: The Digital Darkroom. Prentice Hall, June 1988."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. 8th USENIX Security Symp.","author":"Jermyn I.","year":"1999","unstructured":"I. Jermyn , A. Mayer , F. M. M. Reiter , and A. Rubin . The design and analysis of graphical passwords . In Proc. 8th USENIX Security Symp. , Aug. 1999 . I. Jermyn, A. Mayer, F. M. M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In Proc. 8th USENIX Security Symp., Aug. 1999."},{"key":"e_1_3_2_1_17_1","first-page":"156","article-title":"Does the generation effect occur for pictures?","volume":"6","author":"Kinjo H.","year":"2000","unstructured":"H. Kinjo and J. G. Snodgrass . Does the generation effect occur for pictures? Amer. J. of Psych. , 6 : 156 -- 163 , 2000 . H. Kinjo and J. G. Snodgrass. Does the generation effect occur for pictures? Amer. J. of Psych., 6:156--163, 2000.","journal-title":"Amer. J. of Psych."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.462719"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_3_2_1_20_1","first-page":"151","volume-title":"Proc. of the 13th USENIX Security Symp.","author":"Monrose F.","year":"2004","unstructured":"F. Monrose , D. Davis , and M. Reiter . On user choice to graphical password schemes . In Proc. of the 13th USENIX Security Symp. , pages 151 -- 164 , San Diego, CA , Aug. 2004 . F. Monrose, D. Davis, and M. Reiter. On user choice to graphical password schemes. In Proc. of the 13th USENIX Security Symp., pages 151--164, San Diego, CA, Aug. 2004."},{"key":"e_1_3_2_1_21_1","volume-title":"The science behind Passfaces","author":"Real User Corporation","year":"2001","unstructured":"Real User Corporation . The science behind Passfaces , 2001 . http:\/\/www.realusers.com. Real User Corporation. The science behind Passfaces, 2001. http:\/\/www.realusers.com."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357085"},{"issue":"1","key":"e_1_3_2_1_23_1","first-page":"95","article-title":"Recognition memory for words, sentences and pictures","volume":"113","author":"Shepard R.","year":"1967","unstructured":"R. Shepard . Recognition memory for words, sentences and pictures . J. Verbal Learning and Verbal Behavior , 113 ( 1 ): 95 -- 121 , 1967 . R. Shepard. Recognition memory for words, sentences and pictures. J. Verbal Learning and Verbal Behavior, 113(1):95--121, 1967.","journal-title":"J. Verbal Learning and Verbal Behavior"},{"key":"e_1_3_2_1_24_1","unstructured":"Sony Corporation. Overview of FeliCa. http:\/\/www.sony.net\/Products\/felica\/abt\/dvs.html.  Sony Corporation. Overview of FeliCa. http:\/\/www.sony.net\/Products\/felica\/abt\/dvs.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03337426"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. 13th USENIX Security Symp.","author":"Thorpe J.","year":"2004","unstructured":"J. Thorpe and P. van Oorschot . Graphical dictionaries and the memorable space of graphical passwords . In Proc. 13th USENIX Security Symp. , Aug. 2004 . J. Thorpe and P. van Oorschot. Graphical dictionaries and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symp., Aug. 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.44"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. 16th USENIX Security Symp.","author":"Thorpe J.","year":"2007","unstructured":"J. Thorpe and P. van Oorschot . Human-seeded attacks and exploiting hot-spots in graphical passwords . In Proc. 16th USENIX Security Symp. , Aug. 2007 . J. Thorpe and P. van Oorschot. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proc. 16th USENIX Security Symp., Aug. 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.10"},{"key":"e_1_3_2_1_31_1","volume-title":"HCI International","author":"Wiedenbeck S.","year":"2005","unstructured":"S. Wiedenbeck , J. Waters , J.-C. Birget , A. Brodskiy , and N. Memon . Authentication using graphical passwords: Basic results . In HCI International , July 2005 . S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon. Authentication using graphical passwords: Basic results. In HCI International, July 2005."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"}],"event":{"name":"SOUPS '08: The fourth Symposium on Usable Privacy and Security","location":"Pittsburgh Pennsylvania USA","acronym":"SOUPS '08"},"container-title":["Proceedings of the 4th symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1408664.1408670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:44Z","timestamp":1750255064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408670"}},"subtitle":["secure authentication usable anywhere"],"short-title":[],"issued":{"date-parts":[[2008,7,23]]},"references-count":31,"alternative-id":["10.1145\/1408664.1408670","10.1145\/1408664"],"URL":"https:\/\/doi.org\/10.1145\/1408664.1408670","relation":{},"subject":[],"published":{"date-parts":[[2008,7,23]]},"assertion":[{"value":"2008-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}