{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:04:55Z","timestamp":1730318695116,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T00:00:00Z","timestamp":1468800000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,18]]},"DOI":"10.1145\/2939918.2942423","type":"proceedings-article","created":{"date-parts":[[2016,7,15]],"date-time":"2016-07-15T18:37:18Z","timestamp":1468607838000},"page":"227-228","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Hans-Joachim","family":"Hof","sequence":"first","affiliation":[{"name":"Munich University of Applied Sciences, Munich, Germany"}]},{"given":"Gudrun","family":"Socher","sequence":"additional","affiliation":[{"name":"Munich University of Applied Sciences, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,7,18]]},"reference":[{"volume-title":"John Wiley and Sons","year":"2013","author":"Fernandez-Buglioni E.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"7","volume-title":"The Fifth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2012","author":"Hof H.-J.","year":"2012"},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"78","article-title":"Towards enhanced usability of it security mechanisms -- how to design usable it security mechanisms using the example of email encryption","volume":"6","author":"Hof H.-J.","year":"2013","journal-title":"International Journal On Advances in Security"},{"volume-title":"Prentice Hall","year":"2012","author":"Steel C.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"J. Tidwell. Designing Interaces. O'Reilly Media Inc. 2nd edition 2010. J. Tidwell. Designing Interaces. O'Reilly Media Inc. 2nd edition 2010."}],"event":{"name":"WiSec'16: 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Darmstadt Germany","acronym":"WiSec'16"},"container-title":["Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2939918.2942423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T16:23:28Z","timestamp":1673281408000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2939918.2942423"}},"subtitle":["Security Design Patterns With Good Usability"],"short-title":[],"issued":{"date-parts":[[2016,7,18]]},"references-count":5,"alternative-id":["10.1145\/2939918.2942423","10.1145\/2939918"],"URL":"https:\/\/doi.org\/10.1145\/2939918.2942423","relation":{},"subject":[],"published":{"date-parts":[[2016,7,18]]},"assertion":[{"value":"2016-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}