{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:00:40Z","timestamp":1764842440918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1845300"],"award-info":[{"award-number":["1845300"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002790","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2019-05120"],"award-info":[{"award-number":["RGPIN-2019-05120"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427240","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"249-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond"],"prefix":"10.1145","author":[{"given":"Hassan","family":"Khan","sequence":"first","affiliation":[{"name":"University of Guelph"}]},{"given":"Jason","family":"Ceci","sequence":"additional","affiliation":[{"name":"University of Guelph"}]},{"given":"Jonah","family":"Stegman","sequence":"additional","affiliation":[{"name":"University of Guelph"}]},{"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University, United States of America"}]},{"given":"Rozita","family":"Dara","sequence":"additional","affiliation":[{"name":"University of Guelph, Canada"}]},{"given":"Ravi","family":"Kuber","sequence":"additional","affiliation":[{"name":"University of Maryland Baltimore County"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.24"},{"volume-title":"Most common iPhone passcodes.http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes. Last accessed","year":"2020","key":"e_1_3_2_1_3_1","unstructured":"Amitay, Daniel. 2011. Most common iPhone passcodes.http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes. Last accessed June , 2020 . Amitay, Daniel. 2011. Most common iPhone passcodes.http:\/\/danielamitay.com\/blog\/2011\/6\/13\/most-common-iphone-passcodes. Last accessed June, 2020."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134609"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858164"},{"key":"e_1_3_2_1_10_1","volume-title":"Adventures in Authentication Workshop.","author":"Casimiro Maria","year":"2020","unstructured":"Maria Casimiro , Joe Segel , Lewei Li , Yigeng Wang , and Lorrie\u00a0Faith Cranor . 2020 . A Quest for Inspiration: How Users Create and Reuse PINs . In Adventures in Authentication Workshop. Maria Casimiro, Joe Segel, Lewei Li, Yigeng Wang, and Lorrie\u00a0Faith Cranor. 2020. A Quest for Inspiration: How Users Create and Reuse PINs. In Adventures in Authentication Workshop."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium.","author":"Chiasson Sonia","year":"2006","unstructured":"Sonia Chiasson , Paul\u00a0 C van Oorschot , and Robert Biddle . 2006 . A Usability Study and Critique of Two Password Managers .. In USENIX Security Symposium. Sonia Chiasson, Paul\u00a0C van Oorschot, and Robert Biddle. 2006. A Usability Study and Critique of Two Password Managers.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753490"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837131"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium.","author":"Dhamija Rachna","year":"2000","unstructured":"Rachna Dhamija and Adrian Perrig . 2000 . Deja Vu-A User Study: Using Images for Authentication .. In USENIX Security Symposium. Rachna Dhamija and Adrian Perrig. 2000. Deja Vu-A User Study: Using Images for Authentication.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866395"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Simson Garfinkel and Heather\u00a0Richter Lipford. 2014. Usable security: History themes and challenges. Synthesis Lectures on Information Security Privacy and Trust 5 2(2014).  Simson Garfinkel and Heather\u00a0Richter Lipford. 2014. Usable security: History themes and challenges. Synthesis Lectures on Information Security Privacy and Trust 5 2(2014).","DOI":"10.2200\/S00594ED1V01Y201408SPT011"},{"key":"e_1_3_2_1_21_1","volume-title":"Smart Lock Market Demand To Reach 34.9 Million Units By","author":"Research Grand View","year":"2027","unstructured":"Grand View Research . 2020. Smart Lock Market Demand To Reach 34.9 Million Units By 2027 . https:\/\/www.grandviewresearch.com\/press-release\/global-smart-lock-market. Last accessed June, 2020. Grand View Research. 2020. Smart Lock Market Demand To Reach 34.9 Million Units By 2027. https:\/\/www.grandviewresearch.com\/press-release\/global-smart-lock-market. Last accessed June, 2020."},{"key":"e_1_3_2_1_22_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS).","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel Von\u00a0Zezschwitz , Andreas Fichtner , Alexander De\u00a0Luca , and Matthew Smith . 2014 . It\u2019sa hard lock life: A field study of smartphone (un) locking behavior and risk perception . In 10th Symposium On Usable Privacy and Security (SOUPS). Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019sa hard lock life: A field study of smartphone (un) locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979326"},{"key":"e_1_3_2_1_24_1","unstructured":"Sture Holm. 1979. A simple sequentially rejective multiple test procedure. Scandinavian Journal of Statistics(1979) 65\u201370.  Sture Holm. 1979. A simple sequentially rejective multiple test procedure. Scandinavian Journal of Statistics(1979) 65\u201370."},{"key":"e_1_3_2_1_25_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS).","author":"Huh Jun\u00a0Ho","year":"2015","unstructured":"Jun\u00a0Ho Huh , Hyoungshick Kim , Rakesh\u00a0 B Bobba , Masooda\u00a0 N Bashir , and Konstantin Beznosov . 2015 . On the memorability of system-generated pins: Can chunking help? . In Eleventh Symposium On Usable Privacy and Security (SOUPS). Jun\u00a0Ho Huh, Hyoungshick Kim, Rakesh\u00a0B Bobba, Masooda\u00a0N Bashir, and Konstantin Beznosov. 2015. On the memorability of system-generated pins: Can chunking help?. In Eleventh Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_26_1","unstructured":"Markus Jakobsson and Debin Liu. 2011. Bootstrapping mobile PINs using passwords. http:\/\/www.markus-jakobsson.com\/wp-content\/uploads\/W2SP11-JL.pdf.  Markus Jakobsson and Debin Liu. 2011. Bootstrapping mobile PINs using passwords. http:\/\/www.markus-jakobsson.com\/wp-content\/uploads\/W2SP11-JL.pdf."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979324"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173738"},{"key":"e_1_3_2_1_29_1","volume-title":"PIN selection policies: Are they really effective?Computers & Security 31, 4","author":"Kim Hyoungshick","year":"2012","unstructured":"Hyoungshick Kim and Jun\u00a0Ho Huh . 2012. PIN selection policies: Are they really effective?Computers & Security 31, 4 ( 2012 ), 484\u2013496. Hyoungshick Kim and Jun\u00a0Ho Huh. 2012. PIN selection policies: Are they really effective?Computers & Security 31, 4 (2012), 484\u2013496."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483441"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628372"},{"key":"e_1_3_2_1_32_1","unstructured":"Macorr Research Blog. 2017. Customer Loyalty Cards in Canada. http:\/\/www.macorr.com\/blog\/?p=342. Last accessed June 2020.  Macorr Research Blog. 2017. Customer Loyalty Cards in Canada. http:\/\/www.macorr.com\/blog\/?p=342. Last accessed June 2020."},{"key":"e_1_3_2_1_33_1","volume-title":"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. In IEEE Symposium on Security and Privacy(SP\u00a0\u201920)","author":"Markert Philipp","year":"2020","unstructured":"Philipp Markert , Daniel\u00a0 V. Bailey , Maximilian Golla , Markus D\u00fcrmuth , and Adam\u00a0 J. Aviv . 2020 . This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. In IEEE Symposium on Security and Privacy(SP\u00a0\u201920) . IEEE, San Francisco, California, USA, 1525\u20131542. Philipp Markert, Daniel\u00a0V. Bailey, Maximilian Golla, Markus D\u00fcrmuth, and Adam\u00a0J. Aviv. 2020. This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. In IEEE Symposium on Security and Privacy(SP\u00a0\u201920). IEEE, San Francisco, California, USA, 1525\u20131542."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/passwordless-strategy. Last accessed","author":"Strategy Passwordless","year":"2020","unstructured":"Microsoft. 2018. Passwordless Strategy . https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/passwordless-strategy. Last accessed June , 2020 . Microsoft. 2018. Passwordless Strategy. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/passwordless-strategy. Last accessed June, 2020."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376632"},{"key":"e_1_3_2_1_37_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS).","author":"Park Cheul\u00a0Young","year":"2018","unstructured":"Cheul\u00a0Young Park , Cori Faklaris , Siyan Zhao , Alex Sciuto , Laura Dabbish , and Jason Hong . 2018 . Share and share alike? an exploration of secure behaviors in romantic relationships . In Fourteenth Symposium on Usable Privacy and Security (SOUPS). Cheul\u00a0Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong. 2018. Share and share alike? an exploration of secure behaviors in romantic relationships. In Fourteenth Symposium on Usable Privacy and Security (SOUPS)."},{"volume-title":"Password and PIN Security. https:\/\/www.paypal.com\/us\/webapps\/mpp\/security\/secure-passwords. Last accessed","year":"2020","key":"e_1_3_2_1_38_1","unstructured":"PayPal. 2018. Password and PIN Security. https:\/\/www.paypal.com\/us\/webapps\/mpp\/security\/secure-passwords. Last accessed June , 2020 . PayPal. 2018. Password and PIN Security. https:\/\/www.paypal.com\/us\/webapps\/mpp\/security\/secure-passwords. Last accessed June, 2020."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2004.06.012"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2015.7359406"},{"key":"e_1_3_2_1_41_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS).","author":"Schechter Stuart","year":"2015","unstructured":"Stuart Schechter and Joseph Bonneau . 2015 . Learning assigned secrets for unlocking mobile devices . In Eleventh Symposium On Usable Privacy and Security (SOUPS). Stuart Schechter and Joseph Bonneau. 2015. Learning assigned secrets for unlocking mobile devices. In Eleventh Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.08.006"},{"key":"e_1_3_2_1_44_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS).","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The password life cycle: user behaviour in managing passwords . In 10th Symposium On Usable Privacy and Security (SOUPS). Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In 10th Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_28"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053031"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":48,"alternative-id":["10.1145\/3427228.3427240","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427240","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}