{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:23:10Z","timestamp":1774196590642,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,7]],"date-time":"2011-05-07T00:00:00Z","timestamp":1304726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,7]]},"DOI":"10.1145\/1978942.1979322","type":"proceedings-article","created":{"date-parts":[[2011,5,9]],"date-time":"2011-05-09T12:48:29Z","timestamp":1304945309000},"page":"2605-2614","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["MARASIM"],"prefix":"10.1145","author":[{"given":"Rohit Ashok","family":"Khot","sequence":"first","affiliation":[{"name":"International Institute of Information Technology, Hyderabad, India"}]},{"given":"Kannan","family":"Srinathan","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology, Hyderabad, India"}]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2011,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240772"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. Security and Management 2008","author":"Bedworth M. A.","year":"2008","unstructured":"Bedworth , M. A. Theory of Probabilistic One-Time Passwords , Proc. Security and Management 2008 , CSREA Press ( 2008 ) 113--118. http:\/\/www.pinoptic.com\/downloads\/wp002_a_theory_of_potp.pdf. Last accessed August 2010. Bedworth, M. A. Theory of Probabilistic One-Time Passwords, Proc. Security and Management 2008, CSREA Press (2008) 113--118. http:\/\/www.pinoptic.com\/downloads\/wp002_a_theory_of_potp.pdf. Last accessed August 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. WEIS","author":"Bonneau J.","year":"2010","unstructured":"Bonneau , J. , and Preibusch , S . The password thicket: technical and market failures in human authentication on the web , In Proc. WEIS 2010 . Bonneau, J., and Preibusch, S. The password thicket: technical and market failures in human authentication on the web, In Proc. WEIS 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1098730"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251386"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633455"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251306.1251310"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280684"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.704918"},{"key":"e_1_3_2_1_13_1","unstructured":"Flickr. http:\/\/www.flickr.com.  Flickr. http:\/\/www.flickr.com."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_15_1","unstructured":"Google Images. http:\/\/images.google.com.  Google Images. http:\/\/images.google.com."},{"key":"e_1_3_2_1_16_1","unstructured":"ImageShield&amp;#8482;. http:\/\/www.confidenttechnologies.com\/products\/confident-imageshield.  ImageShield&amp;#8482;. http:\/\/www.confidenttechnologies.com\/products\/confident-imageshield."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_1_18_1","unstructured":"Jigsaw puzzle. http:\/\/en.wikipedia.org\/Jigsaw_puzzle.  Jigsaw puzzle. http:\/\/en.wikipedia.org\/Jigsaw_puzzle."},{"key":"e_1_3_2_1_19_1","volume-title":"Who goes there? Authentication through the lens of privacy. The National academic press","author":"Kent S.","year":"2003","unstructured":"Kent , S. , and Millett , L . Who goes there? Authentication through the lens of privacy. The National academic press , 2003 . Kent, S., and Millett, L. Who goes there? Authentication through the lens of privacy. The National academic press, 2003."},{"key":"e_1_3_2_1_20_1","first-page":"156","article-title":"Does the generation effect occur for pictures?","volume":"6","author":"Kinjo H.","year":"2000","unstructured":"Kinjo , H. , and Snodgrass , J. G . Does the generation effect occur for pictures? Amer. J. of Psych. 6 ( 2000 ), 156 -- 163 . Kinjo, H., and Snodgrass, J. G. Does the generation effect occur for pictures? Amer. J. of Psych. 6(2000), 156--163.","journal-title":"Amer. J. of Psych."},{"key":"e_1_3_2_1_21_1","volume-title":"Models of human memory","author":"Kintsch W.","year":"1970","unstructured":"Kintsch , W. Models for free recall and recognition . In Models of human memory , Academic Press , 1970 . Kintsch, W. Models for free recall and recognition. In Models of human memory, Academic Press, 1970."},{"key":"e_1_3_2_1_22_1","volume-title":"the Proc. Conference on Usable Software and Interface Design (USID)","author":"Khot R. A.","year":"2009","unstructured":"Khot R. A. , Srinathan K. , iCAPTCHA : Image Tagging For Free , In the Proc. Conference on Usable Software and Interface Design (USID) , 2009 . Khot R. A., Srinathan K., iCAPTCHA: Image Tagging For Free, In the Proc. Conference on Usable Software and Interface Design (USID), 2009."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2005.00430.x"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_25_1","volume-title":"Pictorial superiority effect. Journal of Experimental Psychology: Human Learning &amp;#38","author":"Nelson D. L.","year":"1976","unstructured":"Nelson , D. L. , Reed , U. S. , &amp;#38; Walling , J. R. Pictorial superiority effect. Journal of Experimental Psychology: Human Learning &amp;#38 ; Memory , ( 1976 ), 523--528. Nelson, D. L., Reed, U. S., &amp;#38; Walling, J. R. Pictorial superiority effect. Journal of Experimental Psychology: Human Learning &amp;#38; Memory, (1976), 523--528."},{"key":"e_1_3_2_1_26_1","volume-title":"Mind and its evolution: a dual coding theoretical approach","author":"Paivio A.","year":"2006","unstructured":"Paivio , A. Mind and its evolution: a dual coding theoretical approach . Lawrence Erlbaum , 2006 . Paivio, A. Mind and its evolution: a dual coding theoretical approach. Lawrence Erlbaum, 2006."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186723"},{"key":"e_1_3_2_1_28_1","volume-title":"December","author":"Prince B.","year":"2010","unstructured":"Prince , B. Gawker Hack Leads to Twitter Spam Campaign, eWeek , December 2010 . Prince, B. Gawker Hack Leads to Twitter Spam Campaign, eWeek, December 2010."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1571767"},{"key":"e_1_3_2_1_31_1","volume-title":"Inkblot Authentication","author":"Stubblefield A.","year":"2004","unstructured":"Stubblefield , A. , and Simon , D . Inkblot Authentication . Technical Report , MSR-TR- 2004 -85, Microsoft Research , 2004. Stubblefield, A., and Simon, D. Inkblot Authentication. Technical Report, MSR-TR-2004-85, Microsoft Research, 2004."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1362903.1362911"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057036"},{"key":"e_1_3_2_1_35_1","volume-title":"Just Make It HackMe. The New York Times","author":"Vance A.","year":"2010","unstructured":"Vance , A. If Your Password Is 123456 , Just Make It HackMe. The New York Times , January 2010 . Vance, A. If Your Password Is 123456, Just Make It HackMe. The New York Times, January 2010."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_37_1","first-page":"9","article-title":"Cognitive passwords: the key to easy access control","volume":"9","author":"Zviran M.","year":"1991","unstructured":"Zviran , M. and Haga , W. J . Cognitive passwords: the key to easy access control . Comput. Secur. 9 , 9 ( 1991 ), 723--736. Zviran, M. and Haga, W. J. Cognitive passwords: the key to easy access control. Comput. Secur. 9, 9 (1991), 723--736.","journal-title":"Comput. Secur."}],"event":{"name":"CHI '11: CHI Conference on Human Factors in Computing Systems","location":"Vancouver BC Canada","acronym":"CHI '11","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1978942.1979322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1978942.1979322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:04Z","timestamp":1750244764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1978942.1979322"}},"subtitle":["a novel jigsaw based authentication scheme using tagging"],"short-title":[],"issued":{"date-parts":[[2011,5,7]]},"references-count":36,"alternative-id":["10.1145\/1978942.1979322","10.1145\/1978942"],"URL":"https:\/\/doi.org\/10.1145\/1978942.1979322","relation":{},"subject":[],"published":{"date-parts":[[2011,5,7]]},"assertion":[{"value":"2011-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}