{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:49Z","timestamp":1771701229741,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,11]],"date-time":"2012-07-11T00:00:00Z","timestamp":1341964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,11]]},"DOI":"10.1145\/2335356.2335367","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T14:38:27Z","timestamp":1342708707000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Do you see your password?"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Wright","sequence":"first","affiliation":[{"name":"Carleton University Ottawa, Canada"}]},{"given":"Andrew S.","family":"Patrick","sequence":"additional","affiliation":[{"name":"Carleton University Ottawa, Canada"}]},{"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"Carleton University Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2012,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Bauer J. L.","year":"2008","unstructured":"Bauer , J. L. 2008 . Ogden's Basic English . Retrieved November, 2010, from http:\/\/ogden.basic-english.org\/ Bauer, J. L. 2008. Ogden's Basic English. Retrieved November, 2010, from http:\/\/ogden.basic-english.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_4_1","first-page":"800","article-title":"Electronic Authentication Guideline","author":"Burr W. E.","year":"2004","unstructured":"Burr , W. E. , Dodson , D. F. , Polk , W. T. , Evans , D. L. 2004 . Electronic Authentication Guideline , in NIST Special Publication 800 - 863 . Burr, W. E., Dodson, D. F., Polk, W. T., Evans, D. L. 2004. Electronic Authentication Guideline, in NIST Special Publication 800-63.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280682"},{"key":"e_1_3_2_1_6_1","volume-title":"September","author":"Chiasson S.","year":"2008","unstructured":"Chiasson , S. , Forget , A. , Biddle , R. , &amp; Van Oorschot , P. C. 2008. Influencing users toward better passwords: Persuasive Cued Click-Points. Human Computer Interaction (HCI), the British Computer Society , September 2008 . Chiasson, S., Forget, A., Biddle, R., &amp; Van Oorschot, P. C. 2008. Influencing users toward better passwords: Persuasive Cued Click-Points. Human Computer Interaction (HCI), the British Computer Society, September 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"e_1_3_2_1_8_1","volume-title":"2012 The MVP Web-based Authentication Framework, Financial Cryptography and Data Security","author":"Chiasson S.","unstructured":"Chiasson , S. , Deschamps , C. , Stobert , E. , Hlywa , M. , Freitas Machado , B. , Forget , A. , Wright , N. , Chan , G. , &amp; Biddle , R. 2012 The MVP Web-based Authentication Framework, Financial Cryptography and Data Security , Springer . Chiasson, S., Deschamps, C., Stobert, E., Hlywa, M., Freitas Machado, B., Forget, A., Wright, N., Chan, G., &amp; Biddle, R. 2012 The MVP Web-based Authentication Framework, Financial Cryptography and Data Security, Springer."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(72)80001-X"},{"key":"e_1_3_2_1_10_1","volume-title":"Principles of Learning and Memory","author":"Crowder R. G.","unstructured":"Crowder , R. G. 1976. Principles of Learning and Memory . New Jersey : Lawrence Erlbaum Associates . Crowder, R. G. 1976. Principles of Learning and Memory. New Jersey: Lawrence Erlbaum Associates."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 13th USENIX Security Symposium, 151--164","author":"Davis D.","year":"2004","unstructured":"Davis , D. , Monrose , F. , &amp; Reiter , M. K. 2004 . On User Choice in Graphical Password Schemes . Proceedings of the 13th USENIX Security Symposium, 151--164 . Davis, D., Monrose, F., &amp; Reiter, M. K. 2004. On User Choice in Graphical Password Schemes. Proceedings of the 13th USENIX Security Symposium, 151--164."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Deese J. 1959. Influence of inter-item associative strength upon immediate free recall. Psychological Reports (5) 305--312.  Deese J. 1959. Influence of inter-item associative strength upon immediate free recall. Psychological Reports (5) 305--312.","DOI":"10.2466\/pr0.1959.5.3.305"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 9th Conference on USENIX Security Symposium, 9, 4-4.","author":"Dhamija R.","year":"2000","unstructured":"Dhamija , R. , &amp; Perrig , A. 2000 . D&eacute;\u00e9j\u00e0 vu: A user study using Images for Authentication . Proceedings of the 9th Conference on USENIX Security Symposium, 9, 4-4. Dhamija, R., &amp; Perrig, A. 2000. D&eacute;\u00e9j\u00e0 vu: A user study using Images for Authentication. Proceedings of the 9th Conference on USENIX Security Symposium, 9, 4-4."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_16_1","volume-title":"FIPS 112: Password Usage","author":"Federal Information Processing Standards","year":"2011","unstructured":"Federal Information Processing Standards Publication (FIPS) 1985. FIPS 112: Password Usage , National Institute of Standards and Technology , http:\/\/www.itl.nist.gov\/fipspubs\/fip112.htm. Accessed Jan , 2011 . Federal Information Processing Standards Publication (FIPS) 1985. FIPS 112: Password Usage, National Institute of Standards and Technology, http:\/\/www.itl.nist.gov\/fipspubs\/fip112.htm. Accessed Jan, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03197041"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ps.41.020190.000545"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1006\/jmla.1996.2470"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.109.1.49"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.22215\/etd\/2011-08660"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.9.1.21"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.11.1.3"},{"key":"e_1_3_2_1_27_1","volume-title":"Verbal Learning","author":"Jung J.","unstructured":"Jung , J. 1968. Verbal Learning . New York : Holt, Rinehart &amp; Winston . Jung, J. 1968. Verbal Learning. New York: Holt, Rinehart &amp; Winston."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572543"},{"key":"e_1_3_2_1_29_1","volume-title":"Psychology of Verbal Learning and Memory","author":"Kausler D. H.","unstructured":"Kausler , D. H. 1974. Psychology of Verbal Learning and Memory . New York : Academic Press . Kausler, D. H. 1974. Psychology of Verbal Learning and Memory. New York: Academic Press."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_3_2_1_32_1","volume-title":"accessed","author":"Passfaces Corporation","year":"2010","unstructured":"Passfaces Corporation , \" The science behind PassFaces,\" http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm , accessed December 2010 . Passfaces Corporation, \"The science behind PassFaces,\" http:\/\/www.passfaces.com\/enterprise\/resources\/white_papers.htm, accessed December 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2009.026621"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610287"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ps.39.020188.002355"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.13.3.501"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.27"},{"key":"e_1_3_2_1_39_1","volume-title":"16th USENIX Security Symposium","author":"Thorpe J.","year":"2007","unstructured":"Thorpe , J. , &amp; Van Oorschot , P. C. 2007 . Human seeded attacks and exploiting hot-spots in graphical passwords , in 16th USENIX Security Symposium , August 2007. Thorpe, J., &amp; Van Oorschot, P. C. 2007. Human seeded attacks and exploiting hot-spots in graphical passwords, in 16th USENIX Security Symposium, August 2007."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(66)80048-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.2296719"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(79)90397-9"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_44_1","unstructured":"Yan J. Blackwell A. Anderson R. Grant A. 2005. The Memorability and Security of Passwords. In L. F. Cranor &amp; S. Garfinkel (Eds.) Security and Usability: designing secure systems that people can use (pp. 129--142). Sebastopol CA: O'Reillly.  Yan J. Blackwell A. Anderson R. Grant A. 2005. The Memorability and Security of Passwords. In L. F. Cranor &amp; S. Garfinkel (Eds.) Security and Usability: designing secure systems that people can use (pp. 129--142). Sebastopol CA: O'Reillly."}],"event":{"name":"SOUPS '12: Symposium On Usable Privacy and Security","location":"Washington, D.C.","acronym":"SOUPS '12","sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Eighth Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2335356.2335367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2335356.2335367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:10Z","timestamp":1750240090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2335356.2335367"}},"subtitle":["applying recognition to textual passwords"],"short-title":[],"issued":{"date-parts":[[2012,7,11]]},"references-count":44,"alternative-id":["10.1145\/2335356.2335367","10.1145\/2335356"],"URL":"https:\/\/doi.org\/10.1145\/2335356.2335367","relation":{},"subject":[],"published":{"date-parts":[[2012,7,11]]},"assertion":[{"value":"2012-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}