{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:51Z","timestamp":1771701231932,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001804","name":"Canada Research Chairs","doi-asserted-by":"publisher","award":["950-227625"],"award-info":[{"award-number":["950-227625"]}],"id":[{"id":"10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN 418481-2012"],"award-info":[{"award-number":["RGPIN 418481-2012"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841114","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Choose Your Own Authentication"],"prefix":"10.1145","author":[{"given":"Alain","family":"Forget","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]},{"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_27"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"e_1_3_2_1_8_1","volume-title":"October","year":"2015","unstructured":"Daon. Case study: USAA , October 2015 . http:\/\/www.daon.com\/identityx\/usaa-download\/. Daon. Case study: USAA, October 2015. http:\/\/www.daon.com\/identityx\/usaa-download\/."},{"key":"e_1_3_2_1_9_1","volume-title":"John Murray","author":"Darwin C.","year":"1859","unstructured":"C. Darwin . On the Origin of Species by Means of Natural Selection, or the Preservation of Favoured Races in the Struggle for Life . John Murray , 1859 . C. Darwin. On the Origin of Species by Means of Natural Selection, or the Preservation of Favoured Races in the Struggle for Life. John Murray, 1859."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/638249.638253"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408680"},{"key":"e_1_3_2_1_13_1","unstructured":"FIDO alliance October 2015. https:\/\/fidoalliance.org\/.  FIDO alliance October 2015. https:\/\/fidoalliance.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11881-998-0014-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821581"},{"key":"e_1_3_2_1_19_1","volume-title":"World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn). AACE","author":"Forget A.","year":"2012","unstructured":"A. Forget , S. Chiasson , R. Biddle , and P. C. van Oorschot . Can old dogs learn new password tricks? Supporting learning of novel authentication schemes . In World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn). AACE , 2012 . A. Forget, S. Chiasson, R. Biddle, and P. C. van Oorschot. Can old dogs learn new password tricks? Supporting learning of novel authentication schemes. In World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (E-Learn). AACE, 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408666"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.09.001"},{"key":"e_1_3_2_1_22_1","unstructured":"E. Hammer. Introducing OAuth 2.0 May 2010. http:\/\/hueniverse.com\/2010\/05\/introducing-oauth-2-0\/.  E. Hammer. Introducing OAuth 2.0 May 2010. http:\/\/hueniverse.com\/2010\/05\/introducing-oauth-2-0\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2360743.2360824"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076754"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.79.6.995"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_32_1","volume-title":"Economic tussles in federated identity management. First Monday, 17(10)","author":"Landau S.","year":"2012","unstructured":"S. Landau and T. Moore . Economic tussles in federated identity management. First Monday, 17(10) , 2012 . S. Landau and T. Moore. Economic tussles in federated identity management. First Monday, 17(10), 2012."},{"key":"e_1_3_2_1_33_1","unstructured":"LastPass October 2015. https:\/\/lastpass.com\/.  LastPass October 2015. https:\/\/lastpass.com\/."},{"key":"e_1_3_2_1_34_1","unstructured":"maximID October 2015. http:\/\/maximid.com\/.  maximID October 2015. http:\/\/maximid.com\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the IEEE","author":"O'Gorman L.","year":"2003","unstructured":"L. O'Gorman . Comparing passwords, tokens, and biometrics for user authentication . Proceedings of the IEEE , December 2003 . L. O'Gorman. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, December 2003."},{"key":"e_1_3_2_1_37_1","volume-title":"Why are pictures easier to recall than words? Psychonomic Science, 11(4)","author":"Paivio A.","year":"1968","unstructured":"A. Paivio , T. Rogers , and P. Smythe . Why are pictures easier to recall than words? Psychonomic Science, 11(4) , 1968 . A. Paivio, T. Rogers, and P. Smythe. Why are pictures easier to recall than words? Psychonomic Science, 11(4), 1968."},{"key":"e_1_3_2_1_38_1","volume-title":"Models for recall and recognition. Annual review of psychology, 43: 205--234","author":"Raaijmakers J.","year":"1992","unstructured":"J. Raaijmakers and R. Shiffrin . Models for recall and recognition. Annual review of psychology, 43: 205--234 , 1992 . J. Raaijmakers and R. Shiffrin. Models for recall and recognition. Annual review of psychology, 43:205--234, 1992."},{"key":"e_1_3_2_1_39_1","volume-title":"The science behind Passfaces","author":"Real User Corporation","year":"2004","unstructured":"Real User Corporation . The science behind Passfaces , 2004 . Real User Corporation. The science behind Passfaces, 2004."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(02)00067-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"issue":"2","key":"e_1_3_2_1_42_1","volume":"3","author":"Renaud K.","year":"2004","unstructured":"K. Renaud . Quantification of authentication mechanisms - a usability perspective. Journal of Web Engineering , 3 ( 2 ), 2004 . K. Renaud. Quantification of authentication mechanisms - a usability perspective. Journal of Web Engineering, 3(2), 2004.","journal-title":"Journal of Web Engineering"},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium","author":"Ross B.","year":"2005","unstructured":"B. Ross , C. Jackson , N. Miyake , D. Boneh , and J. Mitchell . Stronger password authentication using browser extensions . In USENIX Security Symposium , 2005 . B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In USENIX Security Symposium, 2005."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501619"},{"key":"e_1_3_2_1_46_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). USENIX","author":"Stobert E.","year":"2014","unstructured":"E. Stobert and R. Biddle . The password life cycle: user behaviour in managing passwords . In Symposium on Usable Privacy and Security (SOUPS). USENIX , 2014 . E. Stobert and R. Biddle. The password life cycle: user behaviour in managing passwords. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 2014."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683471"},{"key":"e_1_3_2_1_48_1","volume-title":"October","author":"Microsystems Sun","year":"1995","unstructured":"Sun Microsystems . Unified login with pluggable authentication modules (PAM) , October 1995 . http:\/\/www.kernel.org\/pub\/linux\/libs\/pam\/pre\/doc\/rfc86.0.txt.gz. Sun Microsystems. Unified login with pluggable authentication modules (PAM), October 1995. http:\/\/www.kernel.org\/pub\/linux\/libs\/pam\/pre\/doc\/rfc86.0.txt.gz."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516700"},{"key":"e_1_3_2_1_50_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). USENIX","author":"Ur B.","year":"2015","unstructured":"B. Ur , F. Noma , J. Bees , S. Segreti , R. Shay , L. Bauer , N. Christin , and L. F. Cranor . \" I added `!' at the end to make it secure\": Observing password creation in the lab . In Symposium on Usable Privacy and Security (SOUPS). USENIX , 2015 . B. Ur, F. Noma, J. Bees, S. Segreti, R. Shay, L. Bauer, N. Christin, and L. F. Cranor. \"I added `!' at the end to make it secure\": Observing password creation in the lab. In Symposium on Usable Privacy and Security (SOUPS). USENIX, 2015."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","location":"Twente Netherlands","acronym":"NSPW '15","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841114","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":50,"alternative-id":["10.1145\/2841113.2841114","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841114","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}