{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:01:36Z","timestamp":1776092496280,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":31,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2736277.2741691","type":"proceedings-article","created":{"date-parts":[[2016,2,5]],"date-time":"2016-02-05T20:37:12Z","timestamp":1454704632000},"page":"141-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Secrets, Lies, and Account Recovery"],"prefix":"10.1145","author":[{"given":"Joseph","family":"Bonneau","sequence":"first","affiliation":[{"name":"Stanford University, Palo Alto, CA, USA"}]},{"given":"Elie","family":"Bursztein","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Ilan","family":"Caron","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Rob","family":"Jackson","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Mike","family":"Williamson","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.24"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords May 2012.  Joseph Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords May 2012.","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_4_1","volume-title":"University of Cambridge","author":"Bonneau Joseph","year":"2012"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163581"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"e_1_3_2_1_8_1","volume-title":"CHI Workshop on HCI and Security Systems","author":"Brostoff Sacha","year":"2003"},{"key":"e_1_3_2_1_9_1","first-page":"2000","author":"Brostoff Sacha","year":"2000","journal-title":"HCI"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)00008-4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663749"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium","author":"Dhamija Rachna","year":"2000"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1700527.1700680"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(91)90005-T"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2012.13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357087"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456435"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.80"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572543"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572578"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_1"},{"key":"e_1_3_2_1_25_1","volume-title":"Internet Authentication Based on Personal History--A Feasibility Test. ACM Customer Focused Mobile Services Workshop","author":"Nosseir A.","year":"2005"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)07023-1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408667"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.11"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2559975"},{"key":"e_1_3_2_1_31_1","unstructured":"The Next Web. Microsoft can recycle your outlook.com email address if your account becomes inactive. http:\/\/tnw.co\/1sWsNAU 2013.  The Next Web. Microsoft can recycle your outlook.com email address if your account becomes inactive. http:\/\/tnw.co\/1sWsNAU 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397748"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Moshe Zviran and William J. Haga. A Comparison of Password Techniques for Multilevel Authentication Mechanisms. Computer Journal 36(3):227--237 1993.  Moshe Zviran and William J. Haga. A Comparison of Password Techniques for Multilevel Authentication Mechanisms. Computer Journal 36(3):227--237 1993.","DOI":"10.1093\/comjnl\/36.3.227"}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","location":"Florence Italy","acronym":"WWW '15","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2736277.2741691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:30Z","timestamp":1750227150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2736277.2741691"}},"subtitle":["Lessons from the Use of Personal Knowledge Questions at Google"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":31,"alternative-id":["10.1145\/2736277.2741691","10.5555\/2736277"],"URL":"https:\/\/doi.org\/10.1145\/2736277.2741691","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}