[
    {
        "key": "ZK57FRJV",
        "version": 51,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/ZK57FRJV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/ZK57FRJV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Lashkari et al.",
            "numChildren": 1
        },
        "data": {
            "key": "ZK57FRJV",
            "version": 51,
            "itemType": "journalArticle",
            "title": "A Complete Comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "A.H.",
                    "lastName": "Lashkari"
                },
                {
                    "creatorType": "author",
                    "firstName": "F.",
                    "lastName": "Towhidi"
                },
                {
                    "creatorType": "author",
                    "firstName": "R.",
                    "lastName": "Saleh"
                },
                {
                    "creatorType": "author",
                    "firstName": "S.",
                    "lastName": "Farmand"
                }
            ],
            "abstractNote": "Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative solution to text-based authentication, motivated particularly by the fact that humans can remember images better than text. In recent years, many networks, computer systems and Internet-based environments try used graphical authentication technique for their user's authentication. All of graphical passwords have two different aspects which are usability and security. Unfortunately none of these algorithms were being able to cover both of these aspects at the same time. During our research, we could find eleven recall-based authentication algorithms which we tried to explain their lacks and attacks. Then in the last section, in order to cover usability and security features at the same time, we try to make three different comparison tables.",
            "publicationTitle": "Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on",
            "publisher": "",
            "place": "",
            "date": "28",
            "volume": "1",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "527-532",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on",
            "DOI": "10.1109/ICCEE.2009.81",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Authentication"
                },
                {
                    "tag": "Computer aided software engineering"
                },
                {
                    "tag": "Computer networks"
                },
                {
                    "tag": "Control systems"
                },
                {
                    "tag": "Cued Recall-Based Algorithm"
                },
                {
                    "tag": "Graphical Password"
                },
                {
                    "tag": "Humans"
                },
                {
                    "tag": "IP networks"
                },
                {
                    "tag": "Internet"
                },
                {
                    "tag": "Internet-based environments"
                },
                {
                    "tag": "Protection"
                },
                {
                    "tag": "Pure Recall-Based Algorithm"
                },
                {
                    "tag": "Recall-Based Graphical User Authentication"
                },
                {
                    "tag": "Turing machines"
                },
                {
                    "tag": "Usability"
                },
                {
                    "tag": "computer file"
                },
                {
                    "tag": "computer systems"
                },
                {
                    "tag": "cued recall-based graphical user authentication algorithms"
                },
                {
                    "tag": "graphical user interfaces"
                },
                {
                    "tag": "information security"
                },
                {
                    "tag": "message authentication"
                },
                {
                    "tag": "security"
                },
                {
                    "tag": "text-based authentication"
                },
                {
                    "tag": "text-based password schemes"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-07-10T19:13:49Z",
            "dateModified": "2013-07-10T19:13:49Z"
        }
    },
    {
        "key": "6BAXAWKG",
        "version": 2,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/6BAXAWKG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/6BAXAWKG",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/UTMT6CM7",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "6BAXAWKG",
            "version": 2,
            "parentItem": "UTMT6CM7",
            "itemType": "note",
            "note": "<p>Opisuje zašto lozinke nisu dobre (smao jedna podataka i ode identitet).</p>\n<p>Navodi neke razloge zbog kojih se su lozinke tako perzistentne</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-01-04T15:33:33Z",
            "dateModified": "2013-01-04T15:34:46Z"
        }
    },
    {
        "key": "UTMT6CM7",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/UTMT6CM7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/UTMT6CM7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Sharma et al.",
            "numChildren": 2
        },
        "data": {
            "key": "UTMT6CM7",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Password based authentication: Philosophical survey",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "A.",
                    "lastName": "Sharma"
                },
                {
                    "creatorType": "author",
                    "firstName": "V.",
                    "lastName": "Ojha"
                },
                {
                    "creatorType": "author",
                    "firstName": "R.C.",
                    "lastName": "Belwal"
                },
                {
                    "creatorType": "author",
                    "firstName": "G.",
                    "lastName": "Agarwal"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on",
            "publisher": "",
            "place": "",
            "date": "29",
            "volume": "3",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "619-622",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on",
            "DOI": "10.1109/ICICISYS.2010.5658405",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Authentication"
                },
                {
                    "tag": "Biometrics"
                },
                {
                    "tag": "Cryptography"
                },
                {
                    "tag": "Facsimile"
                },
                {
                    "tag": "Spyware"
                },
                {
                    "tag": "User authentication"
                },
                {
                    "tag": "authentication credential"
                },
                {
                    "tag": "authorisation"
                },
                {
                    "tag": "biometrics (access control)"
                },
                {
                    "tag": "computer system security"
                },
                {
                    "tag": "cost effectiveness"
                },
                {
                    "tag": "identification"
                },
                {
                    "tag": "password"
                },
                {
                    "tag": "password based authentication"
                },
                {
                    "tag": "resource protection"
                },
                {
                    "tag": "security"
                },
                {
                    "tag": "user friendliness"
                },
                {
                    "tag": "username"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-04T15:33:17Z",
            "dateModified": "2013-01-04T15:33:17Z"
        }
    },
    {
        "key": "2BN3RG2T",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/2BN3RG2T",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/2BN3RG2T",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/UTMT6CM7",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "2BN3RG2T",
            "version": 1,
            "parentItem": "UTMT6CM7",
            "itemType": "note",
            "note": "The following values have no corresponding Zotero field:<br/>VO  - 3<br/>",
            "tags": [
                {
                    "tag": "_RIS import"
                }
            ],
            "relations": {},
            "dateAdded": "2013-01-04T15:33:17Z",
            "dateModified": "2013-01-04T15:33:17Z"
        }
    },
    {
        "key": "3HJQX54N",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/3HJQX54N",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/3HJQX54N",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/3JXTITX4",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "3HJQX54N",
            "version": 1,
            "parentItem": "3JXTITX4",
            "itemType": "note",
            "note": "<p>Oopis OAuth protokola - povući paralelu s DQS-ovima</p>\n<p>&nbsp;</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-01-04T15:07:58Z",
            "dateModified": "2013-01-04T15:08:16Z"
        }
    },
    {
        "key": "TTKRTR3C",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/TTKRTR3C",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/TTKRTR3C",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/3JXTITX4",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "TTKRTR3C",
            "version": 1,
            "parentItem": "3JXTITX4",
            "itemType": "note",
            "note": "The following values have no corresponding Zotero field:<br/>VO  - 16<br/>",
            "tags": [
                {
                    "tag": "_RIS import"
                }
            ],
            "relations": {},
            "dateAdded": "2013-01-04T15:07:15Z",
            "dateModified": "2013-01-04T15:07:15Z"
        }
    },
    {
        "key": "3JXTITX4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/3JXTITX4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/3JXTITX4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Leiba",
            "parsedDate": "2012-02",
            "numChildren": 2
        },
        "data": {
            "key": "3JXTITX4",
            "version": 1,
            "itemType": "journalArticle",
            "title": "OAuth Web Authorization Protocol",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "B.",
                    "lastName": "Leiba"
                }
            ],
            "abstractNote": "Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as blogs, photo sharing, and social networks have become widely popular. OAuth, a new protocol for establishing identity management standards across services, provides an alternative to sharing our usernames and passwords, and exposing ourselves to attacks on our online data and identities.",
            "publicationTitle": "Internet Computing, IEEE",
            "publisher": "",
            "place": "",
            "date": "Jan.-Feb.  2012",
            "volume": "16",
            "issue": "1",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "74-77",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Internet Computing, IEEE",
            "DOI": "10.1109/MIC.2012.11",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1089-7801",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Authentication"
                },
                {
                    "tag": "Authorization"
                },
                {
                    "tag": "Browsers"
                },
                {
                    "tag": "Electronic mail"
                },
                {
                    "tag": "Facebook"
                },
                {
                    "tag": "Internet"
                },
                {
                    "tag": "OAuth Web authorization protocol"
                },
                {
                    "tag": "Protocols"
                },
                {
                    "tag": "Servers"
                },
                {
                    "tag": "Social network services"
                },
                {
                    "tag": "Web service"
                },
                {
                    "tag": "Web services"
                },
                {
                    "tag": "access control"
                },
                {
                    "tag": "authorisation"
                },
                {
                    "tag": "identity management"
                },
                {
                    "tag": "identity management standards across services"
                },
                {
                    "tag": "photo sharing"
                },
                {
                    "tag": "social Internet services"
                },
                {
                    "tag": "social networking"
                },
                {
                    "tag": "social networking (online)"
                },
                {
                    "tag": "social networks"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-04T15:07:15Z",
            "dateModified": "2013-01-04T15:07:15Z"
        }
    },
    {
        "key": "ZXITWXJ6",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/ZXITWXJ6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/ZXITWXJ6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "ZXITWXJ6",
            "version": 1,
            "itemType": "bookSection",
            "title": "",
            "creators": [],
            "abstractNote": "",
            "bookTitle": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "",
            "publisher": "",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "",
            "ISBN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-01T17:40:00Z",
            "dateModified": "2013-01-01T17:40:00Z"
        }
    },
    {
        "key": "6NCU73P9",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/6NCU73P9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/6NCU73P9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Milo et al.",
            "parsedDate": "2011-12",
            "numChildren": 0
        },
        "data": {
            "key": "6NCU73P9",
            "version": 1,
            "itemType": "journalArticle",
            "title": "A fast, GPU based, dictionary attack to OpenPGP secret keyrings",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Fabrizio",
                    "lastName": "Milo"
                },
                {
                    "creatorType": "author",
                    "firstName": "Massimo",
                    "lastName": "Bernaschi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Mauro",
                    "lastName": "Bisson"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Journal of Systems and Software",
            "publisher": "",
            "place": "",
            "date": "December 2011",
            "volume": "84",
            "issue": "12",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "2088-2096",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Journal of Systems and Software",
            "DOI": "10.1016/j.jss.2011.05.027",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S0164121211001270",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0164-1212",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "CUDA"
                },
                {
                    "tag": "Cryptanalysis"
                },
                {
                    "tag": "Graphics Processing Units"
                },
                {
                    "tag": "OpenPGP"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-01T16:17:24Z",
            "dateModified": "2013-01-01T16:17:24Z"
        }
    },
    {
        "key": "TIFK2WJK",
        "version": 2,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/TIFK2WJK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/TIFK2WJK",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/2X3J7HCS",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "TIFK2WJK",
            "version": 2,
            "parentItem": "2X3J7HCS",
            "itemType": "note",
            "note": "The following values have no corresponding Zotero field:<br/>ID  - citeulike:5694479<br/>L3  - citeulike-article-id:5694479<br/>",
            "tags": [
                {
                    "tag": "_RIS import"
                }
            ],
            "relations": {},
            "dateAdded": "2013-01-01T16:14:08Z",
            "dateModified": "2013-01-01T16:14:08Z"
        }
    },
    {
        "key": "UBNT7VKR",
        "version": 4,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/UBNT7VKR",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/UBNT7VKR",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Just",
            "parsedDate": "2005",
            "numChildren": 0
        },
        "data": {
            "key": "UBNT7VKR",
            "version": 4,
            "itemType": "bookSection",
            "title": "Designing Authentication Systems with Challenge Questions",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Mike",
                    "lastName": "Just"
                }
            ],
            "abstractNote": "",
            "bookTitle": "Security and Usability: Designing Secure Systems That People Can Use",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "1",
            "date": "2005",
            "publisher": "O'Reilly Media",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "143-160",
            "ISBN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-01T15:52:27Z",
            "dateModified": "2013-01-01T15:54:56Z"
        }
    },
    {
        "key": "QRW8ETTV",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/QRW8ETTV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/QRW8ETTV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "O'Gorman et al.",
            "parsedDate": "2005-10",
            "numChildren": 0
        },
        "data": {
            "key": "QRW8ETTV",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Query-directed passwords",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Lawrence",
                    "lastName": "O'Gorman"
                },
                {
                    "creatorType": "author",
                    "firstName": "Amit",
                    "lastName": "Bagga"
                },
                {
                    "creatorType": "author",
                    "firstName": "Jon",
                    "lastName": "Bentley"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Computers & Security",
            "publisher": "",
            "place": "",
            "date": "October 2005",
            "volume": "24",
            "issue": "7",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "546-560",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Computers & Security",
            "DOI": "10.1016/j.cose.2005.06.006",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S0167404805001008",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0167-4048",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Call center authentication"
                },
                {
                    "tag": "Challenge questions"
                },
                {
                    "tag": "Knowledge-based authentication"
                },
                {
                    "tag": "Password creation"
                },
                {
                    "tag": "Password reset"
                },
                {
                    "tag": "Passwords"
                },
                {
                    "tag": "User authentication"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-01T15:49:48Z",
            "dateModified": "2013-01-01T15:49:48Z"
        }
    },
    {
        "key": "NHNEWQP3",
        "version": 3,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/NHNEWQP3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/NHNEWQP3",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "NHNEWQP3",
            "version": 3,
            "itemType": "journalArticle",
            "title": "Addressing insider threat using “where you are” as fourth factor authentication",
            "creators": [],
            "abstractNote": "Current physical and cybersecurity systems have been relying on traditional three factor authentication to mitigate the threats posed by insider attacks. Typically, systems use one or two of the following factors to authenticate end-users: what you know (e.g., password), what you have (e.g., RSA ID), or what you are (e.g., fingerprint). Systems based on these factors have the following limitations: 1) access is typically bound to a single authentication occurrence leading to remote vulnerabilities, 2) the factors have little impact against persistent insider threats, and 3) many of the authentication systems violate system design principles such as user psychological acceptability by inconveniencing the end-users. In order to mitigate the identified limitations, we propose the usage of “where you are” as a complementary factor that can significantly improve both cybersecurity and physical security. Having accurate location tracking as a new factor for authentication: 1) provides continuous identification tracking and continuous mediation of access to resources, 2) requires remote threats to acquire a physical presence, 3) allows for the enforcement of cybersecurity and physical security policies in real-time through automation, and 4) provides enhanced security without inconveniencing the end-users. Using the strength of location as an authentication factor, this paper specifies design requirements that must be present in an insider-threat Prevention System (iTPS) that is capable of actively monitoring malicious insider behaviors. iTPS has the potential to radically change the physical protection systems and cybersecurity landscape by providing practitioners with the first-of-its-kind tool for real-time insider-threat prevention capabilities. iTPS is particularly suited to address the safety and security needs of critical infrastructure, nuclear facilities, and emergency response situations.",
            "publicationTitle": "Security Technology (ICCST), 2012 IEEE International Carnahan Conference on",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "147 - 153",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-01T11:51:19Z",
            "dateModified": "2013-01-01T11:52:16Z"
        }
    },
    {
        "key": "AP3KRIJD",
        "version": 4,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/AP3KRIJD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/AP3KRIJD",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/7T7TIGSA",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "AP3KRIJD",
            "version": 4,
            "parentItem": "7T7TIGSA",
            "itemType": "note",
            "note": "<p>Analiza grafičkih i vizualnih lozinki kao dio KBA autentifikacije. Gleda dvjie vrste: recall i recognition based .</p>\n<p>&nbsp;</p>\n<p>Dobar i sažet pregled postojećih metoda.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-11T10:13:20Z",
            "dateModified": "2012-04-11T10:23:08Z"
        }
    },
    {
        "key": "FRQDTIH3",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/FRQDTIH3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/FRQDTIH3",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/F972VNJZ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "FRQDTIH3",
            "version": 1,
            "parentItem": "F972VNJZ",
            "itemType": "note",
            "note": "<p>Uporaba wifi uređaja koji korisnik nosi. Kada dođe blizu računala, uređaj ga autentificira.</p>\n<p>Nije KBA, više autentifikacija nečim što imam.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-11T10:09:32Z",
            "dateModified": "2012-04-11T10:11:27Z"
        }
    },
    {
        "key": "NEWST2NT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/NEWST2NT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/NEWST2NT",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/CSN7URXP",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "NEWST2NT",
            "version": 1,
            "parentItem": "CSN7URXP",
            "itemType": "note",
            "note": "<p>Zero-KBA za P2P mreže.</p>\n<p>Kako se autentificirati bez da se oda identitet/lozinka itd.. u P2P mreži.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-11T09:55:57Z",
            "dateModified": "2012-04-11T09:56:59Z"
        }
    },
    {
        "key": "MF65E8N7",
        "version": 2,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/MF65E8N7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/MF65E8N7",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/R4KCBXA6",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "MF65E8N7",
            "version": 2,
            "parentItem": "R4KCBXA6",
            "itemType": "note",
            "note": "<p>KBA temeljeno na pitanjima koji nisu osobna nego se odnose na prethodnu sjednicu korisnika. Nakon registracije i logouta se šalju podatci na mail/SMS i ti podatci o sjednici se koriste kod idućeg logina</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-09T17:15:06Z",
            "dateModified": "2012-04-09T19:54:08Z"
        }
    },
    {
        "key": "RG6TUH96",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/RG6TUH96",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/RG6TUH96",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/R3MVHSSZ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "RG6TUH96",
            "version": 1,
            "parentItem": "R3MVHSSZ",
            "itemType": "note",
            "note": "<p>Napadi na grafičke lozinke.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-09T16:39:18Z",
            "dateModified": "2012-04-09T16:39:33Z"
        }
    },
    {
        "key": "ZJW7DDHN",
        "version": 7,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/ZJW7DDHN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/ZJW7DDHN",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/66TIVMPI",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "ZJW7DDHN",
            "version": 7,
            "parentItem": "66TIVMPI",
            "itemType": "note",
            "note": "<p>Analizira ulogu osobnih pitanja u KBA autentifikaciji. Težnja je na osobnim pitanjima (personal security questions).Stavili su neke teme (4.2 Topics) koji se često koriste u takvim pitanjima.</p>\n<p>Naglasak je na fallback mehanizmima.</p>\n<p>Definiraju neke vlastite METRIKE! (appendix I)</p>\n<p>Dobar pregled drugih KBA radova.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-09T15:35:04Z",
            "dateModified": "2012-04-09T16:04:04Z"
        }
    },
    {
        "key": "GSFADWCI",
        "version": 3,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/GSFADWCI",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/GSFADWCI",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "GSFADWCI",
            "version": 3,
            "itemType": "document",
            "title": "Electronic Authentication Guideline",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://docs.govinfosecurity.com/files/external/NIST-Special-Publication-800-63-1-E-Authentication-Guidelines.pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2012-04-09T15:11:06Z",
            "dateModified": "2012-04-09T15:12:09Z"
        }
    },
    {
        "key": "3FR46IWR",
        "version": 2,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/3FR46IWR",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/3FR46IWR",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/RKEIRNHA",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "3FR46IWR",
            "version": 2,
            "parentItem": "RKEIRNHA",
            "itemType": "note",
            "note": "<p>Analizira i predlaže nove vizaulne, grafičke lozinke kao dio proof by knowledge autentifikacije.</p>\n<p>&nbsp;</p>\n<p>Govori i o manama tekstualnih lozinki.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-09T10:14:31Z",
            "dateModified": "2012-04-09T10:19:49Z"
        }
    },
    {
        "key": "9AFUE87D",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/9AFUE87D",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/9AFUE87D",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/73629/items/T63AJW24",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "9AFUE87D",
            "version": 1,
            "parentItem": "T63AJW24",
            "itemType": "note",
            "note": "<p>Dobar pregled općenitih metoda autentifikacije korisnika.</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2012-04-09T10:01:52Z",
            "dateModified": "2012-04-09T10:02:10Z"
        }
    },
    {
        "key": "F972VNJZ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/F972VNJZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/F972VNJZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "F972VNJZ",
            "version": 1,
            "itemType": "document",
            "title": "Zero-interaction authentication",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.sigmobile.org/awards/mobicom2002-student.pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2012-03-24T16:58:27Z",
            "dateModified": "2012-03-24T16:58:32Z"
        }
    },
    {
        "key": "PTDH4IIS",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/PTDH4IIS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/PTDH4IIS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "PTDH4IIS",
            "version": 1,
            "itemType": "document",
            "title": "Combined Handwriting and Speech Modalities for User Authentication",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://diuf.unifr.ch/people/henneber/cv/download/chasm-research-report-2006.pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2012-03-24T16:56:48Z",
            "dateModified": "2012-03-24T16:56:53Z"
        }
    },
    {
        "key": "7JRHF7KD",
        "version": 1,
        "library": {
            "type": "group",
            "id": 73629,
            "name": "KBA",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/kba",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/73629/items/7JRHF7KD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/kba/items/7JRHF7KD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 522582,
                "username": "kristian skracic",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/kristian_skracic",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "7JRHF7KD",
            "version": 1,
            "itemType": "document",
            "title": "User re-authentication via mouse movements",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://delivery.acm.org/10.1145/1030000/1029210/p1-pusara.pdf?ip=78.0.254.136&acc=ACTIVE%20SERVICE&CFID=92679617&CFTOKEN=85523370&__acm__=1332608413_e2cf794d19a14b40cf06b12f6f92df5a",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2012-03-24T16:55:17Z",
            "dateModified": "2012-03-24T16:55:21Z"
        }
    }
]