{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:56Z","timestamp":1774946576770,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN311982-2010, RT35645"],"award-info":[{"award-number":["RGPIN311982-2010, RT35645"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2683467.2683471","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"39-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["A Password Manager that Doesn't Remember Passwords"],"prefix":"10.1145","author":[{"given":"Elizabeth","family":"Stobert","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]},{"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_10"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2405116.2422416"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"15th USENIX Security Symposium","author":"Chiasson S.","year":"2006","unstructured":"S. Chiasson , P. van Oorschot , and R. Biddle . A Usability Study and Critique of Two Password Managers . In 15th USENIX Security Symposium , pages 1 -- 16 , Vancouver, Canada , 2006 . S. Chiasson, P. van Oorschot, and R. Biddle. A Usability Study and Critique of Two Password Managers. In 15th USENIX Security Symposium, pages 1--16, Vancouver, Canada, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"The Tangled Web of Password Reuse. In NDSS'14: The Network and Distributed System Symposium","author":"Das A.","year":"2014","unstructured":"A. Das , J. Bonneau , M. Caesar , N. Borisov , and X. F. Wang . The Tangled Web of Password Reuse. In NDSS'14: The Network and Distributed System Symposium , San Diego, USA , 2014 . A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. F. Wang. The Tangled Web of Password Reuse. In NDSS'14: The Network and Distributed System Symposium, San Diego, USA, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX LISA","author":"Flor\u00eancio D.","year":"2014","unstructured":"D. Flor\u00eancio , C. Herley , and P. C. van Oorschot . An Administrator's Guide to Internet Password Research . In USENIX LISA , 2014 . D. Flor\u00eancio, C. Herley, and P. C. van Oorschot. An Administrator's Guide to Internet Password Research. In USENIX LISA, 2014."},{"key":"e_1_3_2_1_12_1","volume-title":"Oorschot. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In 23rd USENIX Security Symposium","author":"Flor\u00eancio D.","year":"2014","unstructured":"D. Flor\u00eancio , C. Herley , and P. C. van Oorschot. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In 23rd USENIX Security Symposium , San Diego, USA , Aug. 2014 . D. Flor\u00eancio, C. Herley, and P. C. van Oorschot. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In 23rd USENIX Security Symposium, San Diego, USA, Aug. 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_3_2_1_14_1","volume-title":"I'm the Chrome browser security tech lead, so it might help if I explain our rea... | Hacker News","author":"News Hacker","year":"2013","unstructured":"Hacker News . I'm the Chrome browser security tech lead, so it might help if I explain our rea... | Hacker News , 2013 . https:\/\/news.ycombinator.com\/item?id=6166731. Hacker News. I'm the Chrome browser security tech lead, so it might help if I explain our rea... | Hacker News, 2013. https:\/\/news.ycombinator.com\/item?id=6166731."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979326"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.80"},{"issue":"6","key":"e_1_3_2_1_17_1","first-page":"60","article-title":"When security gets in the way","volume":"16","author":"Norman D. A.","year":"2009","unstructured":"D. A. Norman . When security gets in the way . ACM SIGCSE Bulletin , 16 ( 6 ): 60 , Nov. 2009 . D. A. Norman. When security gets in the way. ACM SIGCSE Bulletin, 16(6):60, Nov. 2009.","journal-title":"ACM SIGCSE Bulletin"},{"key":"e_1_3_2_1_18_1","volume-title":"Imagery and Verbal Processes. Holt, Rinehart, and Winston","author":"Paivio A.","year":"1971","unstructured":"A. Paivio . Imagery and Verbal Processes. Holt, Rinehart, and Winston , 1971 . A. Paivio. Imagery and Verbal Processes. Holt, Rinehart, and Winston, 1971."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03331011"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760479.1760507"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2146303.2146318"},{"key":"e_1_3_2_1_22_1","volume-title":"Stronger Password Authentication Using Browser Extensions. In 14th USENIX Security Symposium","author":"Ross B.","year":"2005","unstructured":"B. Ross , C. Jackson , N. Miyake , D. Boneh , and J. Mitchell . Stronger Password Authentication Using Browser Extensions. In 14th USENIX Security Symposium , Baltimore, USA , Aug. 2005 . B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger Password Authentication Using Browser Extensions. In 14th USENIX Security Symposium, Baltimore, USA, Aug. 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.11"},{"key":"e_1_3_2_1_24_1","unstructured":"B. Schneier. Write Down Your Password June 2005. http:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html.  B. Schneier. Write Down Your Password June 2005. http:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501619"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900556"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078833"},{"issue":"5","key":"e_1_3_2_1_28_1","first-page":"352","volume":"80","author":"Tulving E.","year":"1973","unstructured":"E. Tulving and D. Thomson . Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review , 80 ( 5 ): 352 -- 373 , Dec. 1973 . E. Tulving and D. Thomson. Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review, 80(5):352--373, Dec. 1973.","journal-title":"Encoding Specificity and Retrieval Processes in Episodic Memory. Psychological Review"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011218"},{"key":"e_1_3_2_1_30_1","first-page":"105","volume-title":"Usability Inspection Methods","author":"Wharton C.","year":"1994","unstructured":"C. Wharton , J. Rieman , C. Lewis , and P. Polson . The cognitive walkthrough method: A practitioner's guide . In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods , pages 105 -- 140 . John Wiley & Sons, Inc. , New York, NY, USA , 1994 . C. Wharton, J. Rieman, C. Lewis, and P. Polson. The cognitive walkthrough method: A practitioner's guide. In J. Nielsen and R. L. Mack, editors, Usability Inspection Methods, pages 105--140. John Wiley & Sons, Inc., New York, NY, USA, 1994."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"}],"event":{"name":"NSPW '14: New Security Paradigms Workshop","location":"Victoria British Columbia Canada","acronym":"NSPW '14","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2014 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2683467.2683471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:59Z","timestamp":1750227179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":31,"alternative-id":["10.1145\/2683467.2683471","10.1145\/2683467"],"URL":"https:\/\/doi.org\/10.1145\/2683467.2683471","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}