{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:14Z","timestamp":1750307174435,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T00:00:00Z","timestamp":1315785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,12]]},"DOI":"10.1145\/2073276.2073280","type":"proceedings-article","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T17:50:15Z","timestamp":1323107415000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation"],"prefix":"10.1145","author":[{"given":"Kemal","family":"Bicakci","sequence":"first","affiliation":[{"name":"TOBB University of Economics and Technology, Ankara, Turkey"}]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"workshops). CHI","author":"Adar E.","year":"2011","unstructured":"E. Adar . Why I hate Mechanical Turk research (and workshops). CHI 2011 . E. Adar. Why I hate Mechanical Turk research (and workshops). CHI 2011."},{"key":"e_1_3_2_1_2_1","first-page":"117","volume-title":"Proc. of 5th Australasian Symposium on ACSW Frontiers -","volume":"68","author":"Bard G.V.","year":"2007","unstructured":"G.V. Bard . Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric . Proc. of 5th Australasian Symposium on ACSW Frontiers - volume 68 (ACSW'07), pp. 117 -- 124 . Australian Computer Society , 2007 . G.V. Bard. Spelling-error tolerant, order-independent pass-phrases via the Damerau-Levenshtein string-edit distance metric. Proc. of 5th Australasian Symposium on ACSW Frontiers - volume 68 (ACSW'07), pp.117--124. Australian Computer Society, 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(84)90040-3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2116781"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_6_1","unstructured":"M. Bond. Comments on grIDsure authentication. http:\/\/www.cl.cam.ac.uk\/ ~mkb23\/research\/GridsureComments.pdf March 2008.  M. Bond. Comments on grIDsure authentication. http:\/\/www.cl.cam.ac.uk\/ ~mkb23\/research\/GridsureComments.pdf March 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"Evaluating the usability and security of a graphical one-time PIN system. BCS-HCI","author":"Brostoff S.","year":"2010","unstructured":"S. Brostoff , P. Inglesant , and M. A. Sasse . Evaluating the usability and security of a graphical one-time PIN system. BCS-HCI 2010 . S. Brostoff, P. Inglesant, and M. A. Sasse. Evaluating the usability and security of a graphical one-time PIN system. BCS-HCI 2010."},{"key":"e_1_3_2_1_8_1","volume-title":"School of Computer Science","author":"Brown C.","year":"2010","unstructured":"C. Brown . A Meta-Scheme for Authentication using Text Adventures. Masters thesis , School of Computer Science , Carleton University , Canada , 2010 . C. Brown. A Meta-Scheme for Authentication using Text Adventures. Masters thesis, School of Computer Science, Carleton University, Canada, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX LISA 2010 (slides available online). See also summary by Rik Farrow, ;login: (USENIX Magazine) 36(2):68--69","author":"Cheswick B.","year":"2011","unstructured":"B. Cheswick . Rethinking passwords. Invited talk , USENIX LISA 2010 (slides available online). See also summary by Rik Farrow, ;login: (USENIX Magazine) 36(2):68--69 , April 2011 . B. Cheswick. Rethinking passwords. Invited talk, USENIX LISA 2010 (slides available online). See also summary by Rik Farrow, ;login: (USENIX Magazine) 36(2):68--69, April 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. BCS-HCI","author":"Chiasson S.","year":"2008","unstructured":"S. Chiasson , A. Forget , R. Biddle , P.C. van Oorschot . Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. BCS-HCI 2008 . S. Chiasson, A. Forget, R. Biddle, P.C. van Oorschot. Influencing Users Towards Better Passwords: Persuasive Cued Click-Points. BCS-HCI 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"SOUPS","author":"Chiasson S.","year":"2010","unstructured":"S. Chiasson , C. Deschamps , M. Hlywa , G. Chan , E. Stobert , R. Biddle . MVP : A web-based framework for user studies in authentication (poster) . SOUPS 2010 . S. Chiasson, C. Deschamps, M. Hlywa, G. Chan, E. Stobert, R. Biddle. MVP: A web-based framework for user studies in authentication (poster). SOUPS 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03658-3_27"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_16_1","unstructured":"R. Feynman. Cargo Cult Science Principles of Research. Commencement Address Caltech 1974.  R. Feynman. Cargo Cult Science Principles of Research. Commencement Address Caltech 1974."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_18_1","unstructured":"D. Florencio C. Herley B. Coskun. Do strong passwords accomplish anything? USENIX HotSec'07.   D. Florencio C. Herley B. Coskun. Do strong passwords accomplish anything? USENIX HotSec'07."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2008.136"},{"volume-title":"A research agenda acknowledging the persistence of passwords","author":"Herley C.","key":"e_1_3_2_1_21_1","unstructured":"C. Herley , P.C. van Oorschot . A research agenda acknowledging the persistence of passwords . IEEE Security & Privacy ( to appear, Jan\/Feb 2012). C. Herley, P.C. van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy (to appear, Jan\/Feb 2012)."},{"key":"e_1_3_2_1_22_1","unstructured":"M. Jakobsson E. Shi P. Golle R. Chow. Implicit authentication for mobile devices. USENIX HotSec'09.   M. Jakobsson E. Shi P. Golle R. Chow. Implicit authentication for mobile devices. USENIX HotSec'09."},{"key":"e_1_3_2_1_23_1","volume-title":"May","author":"Jakobsson M.","year":"2011","unstructured":"M. Jakobsson , personal communication , May 2011 . M. Jakobsson, personal communication, May 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90051-5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90006-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920281"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900548"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11880561_16"},{"key":"e_1_3_2_1_30_1","volume-title":"FIPS 181: Automated Password Generator (APG). Oct.5","author":"IST.","year":"1993","unstructured":"IST. FIPS 181: Automated Password Generator (APG). Oct.5 , 1993 . IST. FIPS 181: Automated Password Generator (APG). Oct.5, 1993."},{"key":"e_1_3_2_1_31_1","volume-title":"Gaithersburg","author":"Special Pub NIST","year":"2006","unstructured":"NIST Special Pub . 800--63--1 ( W. Burr , D. Dodson , R. Perlner , W. Polk , S. Gupta , E. Nabbus). Electronic Authentication Guideline . Gaithersburg , April , 2006 . NIST Special Pub. 800--63--1 (W. Burr, D. Dodson, R. Perlner, W. Polk, S. Gupta, E. Nabbus). Electronic Authentication Guideline. Gaithersburg, April, 2006."},{"key":"e_1_3_2_1_32_1","volume-title":"National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy","author":"NIST","year":"2010","unstructured":"NIST NSTIC. National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy . June 25, 2010 draft. http:\/\/www.dhs.gov\/xlibrary\/assets\/ns_tic.pdf NIST NSTIC. National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy. June 25, 2010 draft. http:\/\/www.dhs.gov\/xlibrary\/assets\/ns_tic.pdf"},{"key":"e_1_3_2_1_33_1","volume-title":"Journal of Verbal Learning and Verbal Behavior","author":"Paivio A.","year":"1965","unstructured":"A. Paivio . Abstractness, imagery , and meaningfulness in paired-associate learning . Journal of Verbal Learning and Verbal Behavior , 1965 . A. Paivio. Abstractness, imagery, and meaningfulness in paired-associate learning. Journal of Verbal Learning and Verbal Behavior, 1965."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029632.1029658"},{"issue":"3642","key":"e_1_3_2_1_35_1","first-page":"347","volume":"136","author":"Platt J.R.","year":"1964","unstructured":"J.R. Platt . Strong Inference. Science 136 ( 3642 ): 347 -- 353 ( Oct. 16, 1964 ). J.R. Platt. Strong Inference. Science 136(3642): 347--353 (Oct.16, 1964).","journal-title":"Strong Inference. Science"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(82)90025-6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"volume-title":"ACSAC 2001 (invited essay).","author":"Schell R.","key":"e_1_3_2_1_38_1","unstructured":"R. Schell . Information security: the state of science, pseudoscience, and flying pigs . ACSAC 2001 (invited essay). R. Schell. Information security: the state of science, pseudoscience, and flying pigs. ACSAC 2001 (invited essay)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(94)90064-7"},{"key":"e_1_3_2_1_41_1","volume-title":"The Statistical Security of GrIDsure. Technical report","author":"Weber R.","year":"2006","unstructured":"R. Weber . The Statistical Security of GrIDsure. Technical report , University of Cambridge , 2006 . R. Weber. The Statistical Security of GrIDsure. Technical report, University of Cambridge, 2006."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/36.3.227"}],"event":{"name":"NSPW '11: 2011 New Security Paradigms Workshop","acronym":"NSPW '11","location":"Marin County California USA"},"container-title":["Proceedings of the 2011 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2073276.2073280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2073276.2073280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:49Z","timestamp":1750240489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2073276.2073280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,12]]},"references-count":46,"alternative-id":["10.1145\/2073276.2073280","10.1145\/2073276"],"URL":"https:\/\/doi.org\/10.1145\/2073276.2073280","relation":{},"subject":[],"published":{"date-parts":[[2011,9,12]]},"assertion":[{"value":"2011-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}