{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T17:59:33Z","timestamp":1774029573149,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841120","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"85-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Maybe Poor Johnny Really Cannot Encrypt"],"prefix":"10.1145","author":[{"given":"Zinaida","family":"Benenson","sequence":"first","affiliation":[{"name":"Computer Science Department, Friedrich-Alexander-Universit\u00e4t, Erlangen-N\u00fcrnberg"}]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security Reliability and Trust, University of Luxembourg"}]},{"given":"Daniela","family":"Oliveira","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, University of Florida"}]},{"given":"Simon","family":"Parkin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London"}]},{"given":"Sven","family":"Uebelacker","sequence":"additional","affiliation":[{"name":"Security in Distributed Applications, Hamburg University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Textbook of Work Physiology: Physiological Bases of Exercise","author":"Astrand P. O.","year":"2003","unstructured":"P. O. Astrand , , and K. Rodahl . Textbook of Work Physiology: Physiological Bases of Exercise . McGraw-Hill , 2003 . P. O. Astrand, , and K. Rodahl. Textbook of Work Physiology: Physiological Bases of Exercise. McGraw-Hill, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11901433_4"},{"key":"e_1_3_2_1_6_1","volume-title":"Seeing the full picture: the case for extending security ceremony analysis","author":"Bella G.","year":"2011","unstructured":"G. Bella and L. Coles-Kemp . Seeing the full picture: the case for extending security ceremony analysis . 2011 . G. Bella and L. Coles-Kemp. Seeing the full picture: the case for extending security ceremony analysis. 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596067"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815275"},{"key":"e_1_3_2_1_9_1","unstructured":"The biosig project http:\/\/biosig.sourceforge.net\/.  The biosig project http:\/\/biosig.sourceforge.net\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5271\/sjweh.1470"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/353485.353487"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. USENIX Security","author":"Bonneau J.","year":"2014","unstructured":"J. Bonneau and S. Schechter . Towards reliable storage of 56-bit secrets in human memory . In Proc. USENIX Security , 2014 . J. Bonneau and S. Schechter. Towards reliable storage of 56-bit secrets in human memory. In Proc. USENIX Security, 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508178"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"174","volume":"18","author":"Brown J. S.","year":"1989","unstructured":"J. S. Brown , A. Collins , and P. Duguid . Situated Cognition and the Culture of Learning. Educational Researcher , 18 ( 1 ): 174 -- 196 , 1989 . J. S. Brown, A. Collins, and P. Duguid. Situated Cognition and the Culture of Learning. Educational Researcher, 18(1):174--196, 1989.","journal-title":"Situated Cognition and the Culture of Learning. Educational Researcher"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_2_1_18_1","volume-title":"Model Checking","author":"Clarke E. M.","year":"1999","unstructured":"E. M. Clarke , O. Grumberg , and D. Peled . Model Checking . MIT press , 1999 . E. M. Clarke, O. Grumberg, and D. Peled. Model Checking. MIT press, 1999."},{"key":"e_1_3_2_1_19_1","volume-title":"Human factors and operator errors","author":"Clemens P. L.","year":"2002","unstructured":"P. L. Clemens . Human factors and operator errors . 2002 . P. L. Clemens. Human factors and operator errors. 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993957"},{"key":"e_1_3_2_1_21_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2009","unstructured":"T. H. Cormen , C. E. Leiserson , R. L. Rivest , and C. Stein . Introduction to Algorithms , Third Edition. The MIT Press , 3 rd edition, 2009 . T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, Third Edition. The MIT Press, 3rd edition, 2009."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387650"},{"key":"e_1_3_2_1_23_1","volume-title":"Security and usability: designing secure systems that people can use","author":"Cranor L. F.","year":"2005","unstructured":"L. F. Cranor and S. Garfinkel , editors . Security and usability: designing secure systems that people can use . O'Reilly Media, Inc. , 2005 . L. F. Cranor and S. Garfinkel, editors. Security and usability: designing secure systems that people can use. O'Reilly Media, Inc., 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17533-1_35"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600182"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_27_1","volume-title":"Ceremony design and analysis. IACR Cryptology ePrint Archive","author":"Ellison C. M.","year":"2007","unstructured":"C. M. Ellison . Ceremony design and analysis. IACR Cryptology ePrint Archive , 2007 . C. M. Ellison. Ceremony design and analysis. IACR Cryptology ePrint Archive, 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_28"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. USENIX Security","author":"Flor\u00eancio D.","year":"2014","unstructured":"D. Flor\u00eancio , C. Herley , and P. C. Van Oorschot . Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts . In Proc. USENIX Security , 2014 . D. Flor\u00eancio, C. Herley, and P. C. Van Oorschot. Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts. In Proc. USENIX Security, 2014."},{"key":"e_1_3_2_1_31_1","volume-title":"Computers and Intractability: A guide to the theory of NP-Completeness","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Jonhson . Computers and Intractability: A guide to the theory of NP-Completeness . W. H. Freeman & Co. , 1979 . M. R. Garey and D. S. Jonhson. Computers and Intractability: A guide to the theory of NP-Completeness. W. H. Freeman & Co., 1979."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02343-9"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.1996.tb01071.x"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.134"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00421-004-1055-z"},{"key":"e_1_3_2_1_38_1","volume-title":"Guidance on usability","author":"ISO","year":"2000","unstructured":"ISO 9241-11:1998 Ergonomic requirements for office work with visual display terminals (VDTs) -- Part 11 : Guidance on usability , 2000 . ISO 9241-11:1998 Ergonomic requirements for office work with visual display terminals (VDTs) -- Part 11: Guidance on usability, 2000."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23014"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572578"},{"key":"e_1_3_2_1_42_1","volume-title":"IX(6): 5--38","author":"Kerckhoffs A.","year":"1883","unstructured":"A. Kerckhoffs . La Cryptographie Militaire . Journal des sciences militaires , IX(6): 5--38 , 1883 . A. Kerckhoffs. La Cryptographie Militaire. Journal des sciences militaires, IX(6):5--38, 1883."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23007"},{"key":"e_1_3_2_1_44_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Komanduri S.","year":"2014","unstructured":"S. Komanduri , R. Shay , L. F. Cranor , C. Herley , and S. Schechter . Telepathwords: Preventing weak passwords by reading users' minds . In 23rd USENIX Security Symposium (USENIX Security 14) . San Diego, CA: USENIX Association, pages 591--606 , 2014 . S. Komanduri, R. Shay, L. F. Cranor, C. Herley, and S. Schechter. Telepathwords: Preventing weak passwords by reading users' minds. In 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA: USENIX Association, pages 591--606, 2014."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125886"},{"key":"e_1_3_2_1_47_1","volume-title":"Context and consciousness (Chapter 2 - Activity Theory as a Potential Framework for Human-Computer Interaction Research)","author":"Kuutti K.","year":"1995","unstructured":"K. Kuutti . Context and consciousness (Chapter 2 - Activity Theory as a Potential Framework for Human-Computer Interaction Research) . The MIT Press , 1995 . K. Kuutti. Context and consciousness (Chapter 2 - Activity Theory as a Potential Framework for Human-Computer Interaction Research). The MIT Press, 1995."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592773"},{"key":"e_1_3_2_1_49_1","volume-title":"Willey","author":"Lazar J.","year":"2010","unstructured":"J. Lazar , J. H. Feng , and H. Hochheiser . Research Methods in Human-Computer Interaction . Willey , 2010 . J. Lazar, J. H. Feng, and H. Hochheiser. Research Methods in Human-Computer Interaction. Willey, 2010."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199757183.001.0001"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979244"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600178"},{"key":"e_1_3_2_1_53_1","volume-title":"Weighing the Risks and Benefits of Aging","author":"Mather M.","year":"2006","unstructured":"M. Mather . When I'm 64 - A Review of Decision-Making Processes : Weighing the Risks and Benefits of Aging . The National Academies Press , 2006 . M. Mather. When I'm 64 - A Review of Decision-Making Processes: Weighing the Risks and Benefits of Aging. The National Academies Press, 2006."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420964"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"J. Nielsen. Usability engineering. Elsevier 1994.  J. Nielsen. Usability engineering. Elsevier 1994.","DOI":"10.1016\/B978-0-08-052029-2.50007-3"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664254"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872089303500412"},{"key":"e_1_3_2_1_59_1","volume-title":"Computational Complexity","author":"Papadimitriou C. H.","year":"1994","unstructured":"C. H. Papadimitriou . Computational Complexity . Addison-Wesley Longman , 1994 . C. H. Papadimitriou. Computational Complexity. Addison-Wesley Longman, 1994."},{"key":"e_1_3_2_1_60_1","volume-title":"Louisiana State University","author":"Paritala S. A.","year":"2009","unstructured":"S. A. Paritala . Effects of Physical and Mental Tasks on Heart Rate Variability. Master Thesis , Louisiana State University , 2009 . S. A. Paritala. Effects of Physical and Mental Tasks on Heart Rate Variability. Master Thesis, Louisiana State University, 2009."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68129-8_6"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.010"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1515\/jhsem-2014-0035"},{"key":"e_1_3_2_1_64_1","unstructured":"Polar rs800 http:\/\/www.polar.com\/us-en\/products\/earlier_products\/RS800.  Polar rs800 http:\/\/www.polar.com\/us-en\/products\/earlier_products\/RS800."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1906969"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_9"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367"},{"key":"e_1_3_2_1_68_1","volume-title":"The human contribution","author":"Reason J.","year":"2008","unstructured":"J. Reason . The human contribution . Ashgate Burlington, VT , 2008 . J. Reason. The human contribution. Ashgate Burlington, VT, 2008."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-319-08506-7_13","volume-title":"Why Doesn't Jane Protect Her Privacy? In Privacy Enhancing Technologies","author":"Renaud K.","year":"2014","unstructured":"K. Renaud , M. Volkamer , and A. Renkema-Padmos . Why Doesn't Jane Protect Her Privacy? In Privacy Enhancing Technologies , pages 244 -- 262 . Springer , 2014 . K. Renaud, M. Volkamer, and A. Renkema-Padmos. Why Doesn't Jane Protect Her Privacy? In Privacy Enhancing Technologies, pages 244--262. Springer, 2014."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471028959.sof045"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501609"},{"issue":"9","key":"e_1_3_2_1_72_1","first-page":"338","volume":"63","author":"Saltzer J.","year":"1975","unstructured":"J. Saltzer and M. Schroeder . The Protection of Information in Computer Systems. Proceedings of the IEEE , 63 ( 9 ): 338 -- 402 , 1975 . J. Saltzer and M. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):338--402, 1975.","journal-title":"The Protection of Information in Computer Systems. Proceedings of the IEEE"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"M.\n      Sasse M.\n      Steves K.\n      Krol and \n      D.\n      Chisnell\n  . \n  The great authentication fatigue -- and how to overcome it\n  . In P. Rau editor Cross-Cultural Design volume \n  8528\n   of \n  Lecture Notes in Computer Science pages \n  228\n  --\n  239\n  . \n  Springer International Publishing 2014\n  .  M. Sasse M. Steves K. Krol and D. Chisnell. The great authentication fatigue -- and how to overcome it. In P. Rau editor Cross-Cultural Design volume 8528 of Lecture Notes in Computer Science pages 228--239. Springer International Publishing 2014.","DOI":"10.1007\/978-3-319-07308-8_23"},{"key":"e_1_3_2_1_74_1","volume-title":"Usable security: Why do we need it? how do we get it? In L","author":"Sasse M. A.","year":"2005","unstructured":"M. A. Sasse and I. Flechais . Usable security: Why do we need it? how do we get it? In L . F. Cranor and S. Garfinkel, editors, Security and Usability: Designing secure systems that people can use. O'Reilly , 2005 . M. A. Sasse and I. Flechais. Usable security: Why do we need it? how do we get it? In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing secure systems that people can use. O'Reilly, 2005."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.54.3.182"},{"key":"e_1_3_2_1_76_1","volume-title":"How the Mind Forgets and Remembers","author":"Schacter D. L.","year":"2001","unstructured":"D. L. Schacter . The Seven Sins of Memory : How the Mind Forgets and Remembers . Houghton Mifflin Company , 2001 . D. L. Schacter. The Seven Sins of Memory: How the Mind Forgets and Remembers. Houghton Mifflin Company, 2001."},{"key":"e_1_3_2_1_77_1","volume-title":"Scientific American","author":"Editors Scientific American","year":"2013","unstructured":"Scientific American Editors . Remember When? : The Science of Memory . Scientific American , 2013 . Scientific American Editors. Remember When?: The Science of Memory. Scientific American, 2013."},{"key":"e_1_3_2_1_78_1","volume-title":"The Mathematical Theory of Communication","author":"Shannon C. E.","year":"1949","unstructured":"C. E. Shannon and W. Weaver . The Mathematical Theory of Communication . University of Illinois Press , Urbana, Illinois , 1949 . C. E. Shannon and W. Weaver. The Mathematical Theory of Communication. University of Illinois Press, Urbana, Illinois, 1949."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557377"},{"key":"e_1_3_2_1_80_1","volume-title":"Pearson Education","author":"Shostack A.","year":"2008","unstructured":"A. Shostack and A. Stewart . The new school of information security . Pearson Education , 2008 . A. Shostack and A. Stewart. The new school of information security. Pearson Education, 2008."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844117"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7983"},{"key":"e_1_3_2_1_83_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness. ACM Conference on Human Factors in Computer Systems (CHI)","author":"Sunshine J.","year":"2008","unstructured":"J. Sunshine , S. Egelman , H. Almuhimedi , N. Atri , and L. F. Cranor . Crying Wolf: An Empirical Study of SSL Warning Effectiveness. ACM Conference on Human Factors in Computer Systems (CHI) , 2008 . J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. ACM Conference on Human Factors in Computer Systems (CHI), 2008."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/10.979357"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.30"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4634-3_9"},{"key":"e_1_3_2_1_87_1","volume-title":"Usenix Security","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 . In Usenix Security , 1999 . A. Whitten and J. D. Tygar. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Usenix Security, 1999."},{"key":"e_1_3_2_1_88_1","volume-title":"An introduction to human factors engineering","author":"Wickens C. D.","year":"2004","unstructured":"C. D. Wickens , S. E. Gordon , and Y. Liu . An introduction to human factors engineering . Pearson Prentice Hall Upper Saddle River , NJ :, 2004 . C. D. Wickens, S. E. Gordon, and Y. Liu. An introduction to human factors engineering. Pearson Prentice Hall Upper Saddle River, NJ:, 2004."},{"key":"e_1_3_2_1_89_1","volume-title":"Pearson","author":"Wickens C. D.","year":"2013","unstructured":"C. D. Wickens , J. G. Hollands , S. Banbury , and R. Parasuraman . Engineering psychology and human performance . Pearson , 2013 . C. D. Wickens, J. G. Hollands, S. Banbury, and R. Parasuraman. Engineering psychology and human performance. Pearson, 2013."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.60"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","location":"Twente Netherlands","acronym":"NSPW '15","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841120"}},"subtitle":["The Case for a Complexity Theory for Usable Security"],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":91,"alternative-id":["10.1145\/2841113.2841120","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841120","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}