{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T14:00:01Z","timestamp":1772200801344,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076754","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"149-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Facing the facts about image type in recognition-based graphical passwords"],"prefix":"10.1145","author":[{"given":"Max","family":"Hlywa","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Andrew S.","family":"Patrick","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.106.3.529"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0047473"},{"key":"e_1_3_2_1_3_1","volume-title":"Cognition in Learning and Memory (51--88).","author":"Bower G. H.","year":"1972","unstructured":"Bower , G. H. ( 1972 ). Mental imagery and associative learning . In L. Gregg (Ed.), Cognition in Learning and Memory (51--88). New York : Wiley . Bower, G. H. (1972). Mental imagery and associative learning. In L. Gregg (Ed.), Cognition in Learning and Memory (51--88). New York: Wiley."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03212900"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8295.1986.tb02199.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-63v1.0.2","volume-title":"Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800--63","author":"Burr W.","year":"2006","unstructured":"Burr , W. , Dodson , D. , Polk , W. ( 2006 ). Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800--63 . Burr, W., Dodson, D., Polk, W. (2006). Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800--63."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0071176"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(72)80001-X"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the 13th USENIX Security Symp., 151--164","author":"Davis D.","year":"2004","unstructured":"Davis , D. , Monrose , F. , & Reiter , M. K. ( 2004 ). On User Choree in Graphical Password Schemes . Proc. of the 13th USENIX Security Symp., 151--164 . Davis, D., Monrose, F., & Reiter, M. K. (2004). On User Choree in Graphical Password Schemes. Proc. of the 13th USENIX Security Symp., 151--164."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.115.2.107"},{"key":"e_1_3_2_1_14_1","volume-title":"Is face recognition \"special\"? Evidence from neuropsychology. Behavioural Brain Research, 76(1--2), 181--189","author":"Farah M. J.","year":"1996","unstructured":"Farah , M. J. ( 1996 ) Is face recognition \"special\"? Evidence from neuropsychology. Behavioural Brain Research, 76(1--2), 181--189 . Farah, M. J. (1996) Is face recognition \"special\"? Evidence from neuropsychology. Behavioural Brain Research, 76(1--2), 181--189."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.105.3.482"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jml.2007.12.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(00)01482-0"},{"key":"e_1_3_2_1_19_1","volume-title":"R. Hunt & J","author":"Hunt R. R.","year":"2006","unstructured":"Hunt , R. R. ( 2006 ). The Concept of Distinctiveness in Memory Research . In R. Hunt & J . Worthen (Eds.), Distinctiveness and Memory ( 3--26). New York : Oxford University Press . Hunt, R. R. (2006). The Concept of Distinctiveness in Memory Research. In R. Hunt & J. Worthen (Eds.), Distinctiveness and Memory (3--26). New York: Oxford University Press."},{"key":"e_1_3_2_1_20_1","volume-title":"Studying Password Use in the Wild: Practical Problems and Possible Solutions. SOUPS 2010: Workshop on Usable Security Experiment Reports.","author":"Inglesant P.","year":"2010","unstructured":"Inglesant , P. , Sasse , M. A. ( 2010 ). Studying Password Use in the Wild: Practical Problems and Possible Solutions. SOUPS 2010: Workshop on Usable Security Experiment Reports. Inglesant, P., Sasse, M. A. (2010). Studying Password Use in the Wild: Practical Problems and Possible Solutions. SOUPS 2010: Workshop on Usable Security Experiment Reports."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_1_22_1","volume-title":"Newborns' preferential tracking of face-like stimuli and its subsequent decline. Cognition, 40(1--2), 1--19","author":"Johnson M.","year":"1991","unstructured":"Johnson , M. , Dziurawiec , S. , Ellis , H. , & Morton , J. ( 1991 ). Newborns' preferential tracking of face-like stimuli and its subsequent decline. Cognition, 40(1--2), 1--19 . Johnson, M., Dziurawiec, S., Ellis, H., & Morton, J. (1991). Newborns' preferential tracking of face-like stimuli and its subsequent decline. Cognition, 40(1--2), 1--19."},{"key":"e_1_3_2_1_23_1","volume-title":"Psychology of Verbal Learning and Memory","author":"Kausler D. H.","year":"1974","unstructured":"Kausler , D. H. ( 1974 ). Psychology of Verbal Learning and Memory . New York : Academic Press Kausler, D. H. (1974). Psychology of Verbal Learning and Memory. New York: Academic Press"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(94)00021-8"},{"key":"e_1_3_2_1_25_1","volume-title":"the Face of Tomorrow Project. Available online at http:\/\/www.faceoftomorxow.com\/","author":"Mike M.","year":"2010","unstructured":"Mike , M. ( 2010 ) the Face of Tomorrow Project. Available online at http:\/\/www.faceoftomorxow.com\/ Mike, M. (2010) the Face of Tomorrow Project. Available online at http:\/\/www.faceoftomorxow.com\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bbr.2008.10.041"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.3.5.485"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03331011"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(73)90032-7"},{"key":"e_1_3_2_1_30_1","volume-title":"http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm, accessed","author":"Passfaces Corporation","year":"2009","unstructured":"Passfaces Corporation , \" The science behind Passfaces,\" White paper , http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm, accessed November 2009 . Passfaces Corporation, \"The science behind Passfaces,\" White paper, http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm, accessed November 2009."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"e_1_3_2_1_32_1","first-page":"13","volume-title":"Usable Security. Why do we need it? How do we get it? In Cranor, & S","author":"Sasse M. A.","year":"2005","unstructured":"Sasse , M. A. , & Flechais , I. ( 2005 ). Usable Security. Why do we need it? How do we get it? In Cranor, & S . Garfinkel (Eds.), Security and Usability (pp. 13 -- 30 ). Sebastopol, CA : O'Reilly Media, Inc . Sasse, M. A., & Flechais, I. (2005). Usable Security. Why do we need it? How do we get it? In Cranor, & S. Garfinkel (Eds.), Security and Usability (pp. 13--30). Sebastopol, CA: O'Reilly Media, Inc."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(67)80067-7"},{"key":"e_1_3_2_1_34_1","volume-title":"Learning 10,000 Pictures. Quarterly Journal of Experimental Psychology, 25, 207--222","author":"Standing L.","year":"1973","unstructured":"Standing , L. ( 1973 ). Learning 10,000 Pictures. Quarterly Journal of Experimental Psychology, 25, 207--222 . Standing, L. (1973). Learning 10,000 Pictures. Quarterly Journal of Experimental Psychology, 25, 207--222."},{"key":"e_1_3_2_1_35_1","volume-title":"The leading free stock photography website. Available online at http:\/\/sxc.hu\/","author":"Stock","year":"2010","unstructured":"Stock .xchang ( 2010 ) The leading free stock photography website. Available online at http:\/\/sxc.hu\/ Stock.xchang (2010) The leading free stock photography website. Available online at http:\/\/sxc.hu\/"},{"key":"e_1_3_2_1_36_1","volume-title":"16th USENIX Security Symp.","author":"Thorpe J.","year":"2007","unstructured":"Thorpe , J. , & Van Oorschot , P. C. ( 2007 ). Human seeded attacks and exploiting hot-spots in graphical passwords , in 16th USENIX Security Symp. , 2007. Thorpe, J., & Van Oorschot, P. C. (2007). Human seeded attacks and exploiting hot-spots in graphical passwords, in 16th USENIX Security Symp., 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0035704"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","location":"Orlando Florida USA","acronym":"ACSAC '11","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":38,"alternative-id":["10.1145\/2076732.2076754","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076754","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}