{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:30:45Z","timestamp":1729636245454,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641059","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:20:04Z","timestamp":1383088804000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["SNIPPET: Genuine knowledge-based authentication"],"prefix":"10.1109","author":[{"given":"Karen","family":"Renaud","sequence":"first","affiliation":[]},{"given":"Demetris","family":"Kennes","sequence":"additional","affiliation":[]},{"given":"Johan","family":"van Niekerk","sequence":"additional","affiliation":[]},{"given":"Joe","family":"Maguire","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"151","article-title":"On user choice in graphical password schemes","author":"davis","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610287"},{"key":"17","first-page":"74","article-title":"Password cueing with cue(ink)blots","author":"renaud","year":"2008","journal-title":"IADIS Computer Graphics and Visualization 2008 (CGV 2008) Conference"},{"journal-title":"Outliers The Story of Success","year":"2009","author":"gladwell","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2007.371279"},{"key":"15","first-page":"185","article-title":"Assessing age-related differences in the long-term retention of skills","author":"rogers","year":"1996","journal-title":"Aging and Skilled Performance Advances in Theory and Applications"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/CONGRESS.2009.10"},{"journal-title":"A Taxonomy for Learning Teaching and Assessing A Revision of Bloom's Taxonomy of Educational Objectives","year":"2001","author":"anderson","key":"16"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"journal-title":"Toolkit Evaluating Enterprise Options for Managing Passwords","year":"2006","author":"kreizman","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0692(06)01012-9"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.104.3.268"},{"journal-title":"Federal trade commission plaintiff v wyndham worldwide corporation wyndham hotel group llc wyndham hotels &resorts llc and wyndham hotel management","year":"2012","key":"11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0701362104"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"21","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/1-84628-249-7_11","article-title":"A visuo-biometric authentication mechanism for older users","author":"renaud","year":"2006","journal-title":"People and Computers XIXThe Bigger Picture Springer"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186723"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1058406.1058408"},{"key":"22","article-title":"Deja vu: A user study using images for authentication","author":"dhamija","year":"2000","journal-title":"Proceedings of the 9th conference on USENIX Security Symposium"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060031"},{"key":"24","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1080\/016502597385108","article-title":"Distinguishing ones own voice from those of others: A function for private speech?","volume":"20","author":"fernyhough","year":"1997","journal-title":"International Journal of Behavioral Development"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/S1053-8119(03)00088-0"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2006.06.042"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1111\/j.0956-7976.2004.00727.x"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/0162-3095(80)90009-6"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1068\/p5540"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/2.820038"},{"journal-title":"Guidelines on Evaluation of Techniques for Automated Personal Identification","year":"1977","key":"2"},{"key":"10","article-title":"On building systems that will fail","author":"corbato","year":"1990","journal-title":"ACM Turing Award Lectures"},{"journal-title":"We're Born to Learn Using the Brain's Natural Learning Process to Create Today's Curriculum","year":"2003","author":"smilkstein","key":"1"},{"key":"30","article-title":"Evidence for an own-age bias in face recognition","author":"anastasi","year":"2006","journal-title":"North American Journal of Psychology"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265412"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053327"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/S0001-6918(03)00052-0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90049-7"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1097\/WNR.0b013e3282f97b4d"},{"key":"4","first-page":"335","article-title":"An experimental time-sharing system","author":"corbato","year":"1962","journal-title":"Proceedings of the Spring Joint Computer Conference ACM"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"8","first-page":"10","article-title":"Do strong web passwords accomplish anything?","author":"florencio","year":"2007","journal-title":"Proceedings of the 2nd USENIX Workshop on Hot Topics in Security USENIX Association"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641059.pdf?arnumber=6641059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:01:52Z","timestamp":1498093312000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641059","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}