{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:56Z","timestamp":1774946576836,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1347186"],"award-info":[{"award-number":["1347186"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025991","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"3764-3774","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Thumprint"],"prefix":"10.1145","author":[{"given":"Sauvik","family":"Das","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Gierad","family":"Laput","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Chris","family":"Harrison","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Jason I.","family":"Hong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_2_1","volume-title":"Security Protocols","author":"Bond Mike","unstructured":"Mike Bond . 2005. The Dining Freemasons (Security Protocols for Secret Societies) . In Security Protocols . Springer Berlin Heidelberg , 258--265. Mike Bond. 2005. The Dining Freemasons (Security Protocols for Secret Societies). In Security Protocols. Springer Berlin Heidelberg, 258--265."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470978160"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Workshop on Technology for Today's Family.","author":"Bernheim Brush A J","year":"2012","unstructured":"A J Bernheim Brush . 2012 . It's Used by Us: Family Friendly Access Control . Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Workshop on Technology for Today's Family. A J Bernheim Brush. 2012. It's Used by Us: Family Friendly Access Control. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Workshop on Technology for Today's Family."},{"key":"e_1_3_2_2_6_1","unstructured":"L.F. Cranor and S. Garinkel. 2005. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media.  L.F. Cranor and S. Garinkel. 2005. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media."},{"key":"e_1_3_2_2_7_1","volume-title":"Detecting User Activities Using the Accelerometer on Android Smartphones","author":"Das Sauvik","unstructured":"Sauvik Das , LaToya Green , Beatrice Perez , Michael Murphy , and Adrian Perrig . 2010. Detecting User Activities Using the Accelerometer on Android Smartphones . Carnegie Mellon University . Sauvik Das, LaToya Green, Beatrice Perez, Michael Murphy, and Adrian Perrig. 2010. Detecting User Activities Using the Accelerometer on Android Smartphones. Carnegie Mellon University."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS'14)","author":"Das Sauvik","unstructured":"Sauvik Das , Hyun Jin Kim , Laura A. Dabbish , and Jason I. Hong . 2014. The Effect of Social Influence on Security Sensitivity . Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS'14) . Sauvik Das, Hyun Jin Kim, Laura A. Dabbish, and Jason I. Hong. 2014. The Effect of Social Influence on Security Sensitivity. Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS'14)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675225"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460666"},{"key":"e_1_3_2_2_12_1","volume-title":"Proc. International Joint Conference on Uncertainty in AI, 1022--1027","author":"Usama","year":"2014","unstructured":"Usama M. Fayyad and Keki B. Irani. 1993. MultiInterval Discretization of Continuos-Valued Attributes for Classification Learning . Proc. International Joint Conference on Uncertainty in AI, 1022--1027 . Retrieved from http:\/\/trsnew.jpl.nasa.gov\/dspace\/handle\/ 2014 \/35171 Usama M. Fayyad and Keki B. Irani. 1993. MultiInterval Discretization of Continuos-Valued Attributes for Classification Learning. Proc. International Joint Conference on Uncertainty in AI, 1022--1027. Retrieved from http:\/\/trsnew.jpl.nasa.gov\/dspace\/handle\/2014\/35171"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124862"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702295"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380184"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/01422419908228843"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501607"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_14"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.10.002"},{"key":"e_1_3_2_2_20_1","first-page":"681","article-title":"Social Loafing: A Meta-Analytic Review and Theoretical Integration","volume":"65","author":"Karau Steven J.","year":"1993","unstructured":"Steven J. Karau and Kipling D. Williams . 1993 . Social Loafing: A Meta-Analytic Review and Theoretical Integration . Interpersonal Relations and Group Processes 65 , 4: 681 -- 706 . http:\/\/doi.org\/10.1037\/00223514.65.4.681 10.1037\/00223514.65.4.681 Steven J. Karau and Kipling D. Williams. 1993. Social Loafing: A Meta-Analytic Review and Theoretical Integration. Interpersonal Relations and Group Processes 65, 4: 681--706. http:\/\/doi.org\/10.1037\/00223514.65.4.681","journal-title":"Interpersonal Relations and Group Processes"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_2_22_1","volume-title":"Secret Knocks and Passwords. The Stranger. Retrieved","author":"Kiley Brendan","year":"2017","unstructured":"Brendan Kiley . 2005. Secret Knocks and Passwords. The Stranger. Retrieved January 5, 2017 from http:\/\/www.thestranger.com\/seattle\/secret-knocks-andpasswords\/Content?oid=25434 Brendan Kiley. 2005. Secret Knocks and Passwords. The Stranger. Retrieved January 5, 2017 from http:\/\/www.thestranger.com\/seattle\/secret-knocks-andpasswords\/Content?oid=25434"},{"key":"e_1_3_2_2_23_1","first-page":"215","article-title":"Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient","volume":"208","author":"Koppel Ross","year":"2015","unstructured":"Ross Koppel , Sean Smith , Jim Blythe , and Vijay Kothari . 2015 . Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient ? Studies in Health Technology and Informatics 208 : 215 -- 220 . http:\/\/doi.org\/10.3233\/9781--61499--488--6--215 10.3233\/9781--61499--488--6--215 Ross Koppel, Sean Smith, Jim Blythe, and Vijay Kothari. 2015. Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? Studies in Health Technology and Informatics 208: 215--220. http:\/\/doi.org\/10.3233\/9781--61499--488--6--215","journal-title":"Studies in Health Technology and Informatics"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.37.6.822"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047231"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167294205005"},{"key":"e_1_3_2_2_29_1","volume-title":"Chaos Computer Club breaks Apple TouchID. Retrieved","author":"Rieger Frank","year":"2017","unstructured":"Frank Rieger . 2013. Chaos Computer Club breaks Apple TouchID. Retrieved January 5, 2017 from https:\/\/www.ccc.de\/en\/updates\/2013\/ccc-breaks-appletouchid Frank Rieger. 2013. Chaos Computer Club breaks Apple TouchID. Retrieved January 5, 2017 from https:\/\/www.ccc.de\/en\/updates\/2013\/ccc-breaks-appletouchid"},{"key":"e_1_3_2_2_30_1","article-title":"Silhouettes: A graphical aid to the interpretation and validation of cluster analysis","author":"Rousseeuw Peter J.","year":"1987","unstructured":"Peter J. Rousseeuw . 1987 . Silhouettes: A graphical aid to the interpretation and validation of cluster analysis . Journal of Computational and Applied Mathematics 20, C: 53--65. http:\/\/doi.org\/10.1016\/03770427(87)90125-7 10.1016\/03770427(87)90125-7 Peter J. Rousseeuw. 1987. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20, C: 53--65. http:\/\/doi.org\/10.1016\/03770427(87)90125-7","journal-title":"Journal of Computational and Applied Mathematics 20, C: 53--65. http:\/\/doi.org\/10.1016\/03770427(87)90125-7"},{"key":"e_1_3_2_2_31_1","volume-title":"Digital Security in a Networked World","author":"Schneier Bruce","unstructured":"Bruce Schneier . 2000. Secret & Lies : Digital Security in a Networked World . John Wiley & Sons . Bruce Schneier. 2000. Secret & Lies: Digital Security in a Networked World. John Wiley & Sons."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357086"},{"key":"e_1_3_2_2_34_1","unstructured":"G\u00e9rard Vincent. 1991. A history of secrets? In A History of Private Life: Riddles of Identity in Modern Times. 145--281.  G\u00e9rard Vincent. 1991. A history of secrets? In A History of Private Life: Riddles of Identity in Modern Times. 145--281."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622194"},{"key":"e_1_3_2_2_37_1","unstructured":"Shibboleth. Wikipedia. Retrieved January 5 2017 from https:\/\/en.wikipedia.org\/wiki\/Shibboleth  Shibboleth. Wikipedia. Retrieved January 5 2017 from https:\/\/en.wikipedia.org\/wiki\/Shibboleth"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025991","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:17Z","timestamp":1750215797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025991"}},"subtitle":["Socially-Inclusive Local Group Authentication Through Shared Secret Knocks"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":36,"alternative-id":["10.1145\/3025453.3025991","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025991","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}