{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:37Z","timestamp":1763468137979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T00:00:00Z","timestamp":1374624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,7,24]]},"DOI":"10.1145\/2501604.2501619","type":"proceedings-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T13:40:50Z","timestamp":1375191650000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Memory retrieval and graphical passwords"],"prefix":"10.1145","author":[{"given":"Elizabeth","family":"Stobert","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,7,24]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1037\/h0033773"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2333112.2333114"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/978-3-642-32946-3_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/s10207-009-0080-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/S0022-5371(72)80001-X"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Davis D.","year":"2004","unstructured":"D. Davis , F. Monrose , and M. K. Reiter . On user choice in graphical password schemes . In Proceedings of the 13th USENIX Security Symposium , Berkeley, CA, USA , 2004 . USENIX Association. D. Davis, F. Monrose, and M. K. Reiter. On user choice in graphical password schemes. In Proceedings of the 13th USENIX Security Symposium, Berkeley, CA, USA, 2004. USENIX Association."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_8_1","volume-title":"August","author":"Designer S.","year":"2011","unstructured":"S. Designer . John the Ripper Password Cracker , August 2011 . http:\/\/www.openwall.com\/john. S. Designer. John the Ripper Password Cracker, August 2011. http:\/\/www.openwall.com\/john."},{"key":"e_1_3_2_1_9_1","volume-title":"Fundamentals of Human Memory and Cognition. Wm","author":"Ellis H. C.","year":"1989","unstructured":"H. C. Ellis and R. R. Hunt . Fundamentals of Human Memory and Cognition. Wm . C. Brown Publishers , Dubuque, Iowa , 4 th edition, 1989 . H. C. Ellis and R. R. Hunt. Fundamentals of Human Memory and Cognition. Wm. C. Brown Publishers, Dubuque, Iowa, 4th edition, 1989.","edition":"4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1242572.1242661"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1837110.1837124"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1037\/0278-7393.18.4.691"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.2307\/1413450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS)","author":"Kelley P. G.","year":"2010","unstructured":"P. G. Kelley . Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk . In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS) , New York, USA , 2010 . ACM. P. G. Kelley. Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk. In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS), New York, USA, 2010. ACM."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1357054.1357127"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.2307\/1423627"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1037\/0278-7393.2.1.49"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1037\/0278-7393.3.5.485"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1037\/0278-7393.2.5.523"},{"key":"e_1_3_2_1_21_1","volume-title":"Imagery and Verbal Processes. Holt, Rinehart, and Winston","author":"Paivio A.","year":"1971","unstructured":"A. Paivio . Imagery and Verbal Processes. Holt, Rinehart, and Winston , 1971 . A. Paivio. Imagery and Verbal Processes. Holt, Rinehart, and Winston, 1971."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.3758\/BF03331011"},{"key":"e_1_3_2_1_23_1","volume-title":"The Science Behind Passfaces. Technical report","author":"Real User Corporation","year":"2004","unstructured":"Real User Corporation . The Science Behind Passfaces. Technical report , Real User Corporation , June 2004 . Real User Corporation. The Science Behind Passfaces. Technical report, Real User Corporation, June 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1111\/1467-8721.ep10772899"},{"issue":"5","key":"e_1_3_2_1_25_1","first-page":"352","volume":"80","author":"Tulving E.","year":"1973","unstructured":"E. Tulving and D. M. Thompson . Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review , 80 ( 5 ): 352 -- 373 , 1973 . E. Tulving and D. M. Thompson. Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review, 80(5):352--373, 1973.","journal-title":"Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1284680.1284685"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.5555\/2011216.2011218"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1016\/S0022-5371(79)90397-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1016\/j.ijhcs.2005.04.010"}],"event":{"sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"SOUPS '13","name":"SOUPS '13: Symposium On Usable Privacy and Security","location":"Newcastle United Kingdom"},"container-title":["Proceedings of the Ninth Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2501604.2501619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2501604.2501619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:48Z","timestamp":1750231728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2501604.2501619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,24]]},"references-count":29,"alternative-id":["10.1145\/2501604.2501619","10.1145\/2501604"],"URL":"https:\/\/doi.org\/10.1145\/2501604.2501619","relation":{},"subject":[],"published":{"date-parts":[[2013,7,24]]},"assertion":[{"value":"2013-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}