{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:02Z","timestamp":1750221242390,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,25]]},"DOI":"10.1145\/3227609.3227687","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving the Evaluation of Shoulder Surfing Attacks"],"prefix":"10.1145","author":[{"given":"Leon","family":"Bo\u0161njak","sequence":"first","affiliation":[{"name":"University of Maribor, Maribor"}]},{"given":"Bo\u0161njak","family":"Brumen","sequence":"additional","affiliation":[{"name":"University of Maribor, Maribor"}]}],"member":"320","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and Xiaofeng Wang. 2014. The Tangled Web of Password Reuse. In NDSS. Internet Society San Diego CA USA 15.  Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and Xiaofeng Wang. 2014. The Tangled Web of Password Reuse. In NDSS. Internet Society San Diego CA USA 15."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2568187"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078810.3078815"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2270227"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0928-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"}],"event":{"name":"WIMS '18: 8th International Conference on Web Intelligence, Mining and Semantics","acronym":"WIMS '18","location":"Novi Sad Serbia"},"container-title":["Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3227609.3227687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:33Z","timestamp":1750212453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":10,"alternative-id":["10.1145\/3227609.3227687","10.1145\/3227609"],"URL":"https:\/\/doi.org\/10.1145\/3227609.3227687","relation":{},"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"2018-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}