{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:40Z","timestamp":1750306780796,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523672","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"119-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Revisiting graphical passwords for augmenting, not replacing, text passwords"],"prefix":"10.1145","author":[{"given":"Murat","family":"Akpulat","sequence":"first","affiliation":[{"name":"Gumushane University, Gumushane, Turkey"}]},{"given":"Kemal","family":"Bicakci","sequence":"additional","affiliation":[{"name":"TOBB University of Economics and Technology, Ankara, Turkey"}]},{"given":"Ugur","family":"Cil","sequence":"additional","affiliation":[{"name":"TOBB University of Economics and Technology, Ankara, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The science behind passfaces. www.realuser.com\/published\/ScienceBehindPassfaces.pdf. Accessed: 03\/03\/2012.  The science behind passfaces. www.realuser.com\/published\/ScienceBehindPassfaces.pdf. Accessed: 03\/03\/2012."},{"key":"e_1_3_2_1_2_1","unstructured":"Weak password brings 'happiness' to twitter hacker. www.wired.com\/threatlevel\/2009\/01\/professed-twitt. Accessed: 03\/03\/2013.  Weak password brings 'happiness' to twitter hacker. www.wired.com\/threatlevel\/2009\/01\/professed-twitt. Accessed: 03\/03\/2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.153"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29889-9_9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35694-0_10"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. WEIS","author":"Bonneau J.","year":"2010","unstructured":"J. Bonneau and S. Preibusch . The password thicket: technical and market failures in human authentication on the web . In Proc. WEIS , 2010 . J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. In Proc. WEIS, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_11_1","unstructured":"W. Burr. Electronic authentication guideline. NIST special publication 800:63.  W. Burr. Electronic authentication guideline. NIST special publication 800:63."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_3_2_1_13_1","first-page":"4","volume-title":"Proceedings of the 9th conference on USENIX Security Symposium -","volume":"9","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . D\u00e9j\u00e0 vu: A user study using images for authentication . In Proceedings of the 9th conference on USENIX Security Symposium - Volume 9 , SSYM'00, pages 4 -- 4 , Berkeley, CA, USA , 2000 . USENIX Association. R. Dhamija and A. Perrig. D\u00e9j\u00e0 vu: A user study using images for authentication. In Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, SSYM'00, pages 4--4, Berkeley, CA, USA, 2000. USENIX Association."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076755"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251421.1251422"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"e_1_3_2_1_18_1","first-page":"153","volume-title":"ICA3PP 2011 Workshops, Part II, LNCS 7017","author":"Khan W.","year":"2011","unstructured":"W. Khan , Y. Xiang , M. Aalsalem , and Q. Arshad . A hybrid graphical password based system . In ICA3PP 2011 Workshops, Part II, LNCS 7017 , pages 153 -- 164 , 2011 . W. Khan, Y. Xiang, M. Aalsalem, and Q. Arshad. A hybrid graphical password based system. In ICA3PP 2011 Workshops, Part II, LNCS 7017, pages 153--164, 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"International Journal of Network Security & Its Applications (IJNSA), 3(2)","author":"Singh C.","year":"2011","unstructured":"C. Singh , L. Singh , C. Singh , and L. Singh . Investigating the combination of text and graphical passwords for a more secure and usable experience . International Journal of Network Security & Its Applications (IJNSA), 3(2) , 2011 . C. Singh, L. Singh, C. Singh, and L. Singh. Investigating the combination of text and graphical passwords for a more secure and usable experience. International Journal of Network Security & Its Applications (IJNSA), 3(2), 2011."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01187-0_19"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":20,"alternative-id":["10.1145\/2523649.2523672","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523672","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}