@Preamble{preamble}

This is some arbitrary user comment that should be preserved

@String{firstString  = {my first string}}
This is some user comment in front of a string, should also be preserved.
@String{secondString = {}}

@PhdThesis{deBraga2001,
  author  = {Michael deBraga},
  title   = {{The postcranial anatomy of \textit{Procolophon} (Parareptilia: Procolophonidae) and its implications for the origin of turtles}},
  year    = {2001},
  type    = {PhD thesis},
  note    = {303 pp.},
  address = {Canada},
  school  = {Department of Zoology, University of Toronto},
}

@Article{1102917,
  author     = {E. Bardram},
  title      = {The trouble with login: on usability and computer security in ubiquitous computing},
  doi        = {http://dx.doi.org/10.1007/s00779-005-0347-6},
  issn       = {1617-4909},
  number     = {6},
  pages      = {357--367},
  volume     = {9},
  address    = {London, UK},
  bdsk-url-1 = {http://dx.doi.org/10.1007/s00779-005-0347-6},
  groups     = {TestOne, TestTwo},
  journal    = {Personal Ubiquitous Comput.},
  priority   = {prio1},
  publisher  = {Springer-Verlag},
  year       = {2005},
}

@InProceedings{1137631,
  author     = {Gustav Bostr\"{o}m and Jaana W\"{a}yrynen and Marine Bod\'{e}n and Konstantin Beznosov and Philippe Kruchten, Churchill},
  booktitle  = {SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems},
  title      = {Extending XP practices to support security requirements engineering},
  doi        = {http://doi.acm.org/10.1145/1137627.1137631},
  isbn       = {1-59593-411-1},
  location   = {Shanghai, China},
  pages      = {11--18},
  publisher  = {ACM},
  address    = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137631},
  file       = {:/Volumes/iDisk/Freie Universität Berlin/Semester 9/Softwareprozesse/p11-bostrom.pdf:PDF},
  groups     = {StaticGroup, TestOneSubOne, TestOneSubTwo, TestOne, TestTwo},
  year       = {2006},
}

@InProceedings{1132768,
  author     = {Christina Braz and Jean-Marc Robert},
  booktitle  = {IHM '06: Proceedings of the 18th International Conferenceof the Association Francophone d'Interaction Homme-Machine},
  title      = {Security and usability: the case of the user authentication methods},
  doi        = {http://doi.acm.org/10.1145/1132736.1132768},
  isbn       = {1-59593-350-6},
  location   = {Montreal, Canada},
  pages      = {199--203},
  publisher  = {ACM},
  address    = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1132736.1132768},
  groups     = {TestOneSubTwo, TestOneSubOne},
  year       = {2006},
}

@InProceedings{1137628,
  author     = {Danilo Bruschi and Bart De Win and Mattia Monga},
  booktitle  = {SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems},
  title      = {Introduction to software engineering for secure systems: SESS06 -- secure by design},
  doi        = {http://doi.acm.org/10.1145/1137627.1137628},
  isbn       = {1-59593-411-1},
  location   = {Shanghai, China},
  pages      = {1--2},
  publisher  = {ACM},
  address    = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137628},
  groups     = {TestTwo},
  readstatus = {read},
  year       = {2006},
}

@Article{1373163,
  author     = {Elizabeth Churchill and Les Nelson and Diana K. Smetters},
  title      = {Useful Computer Security},
  doi        = {http://dx.doi.org/10.1109/MIC.2008.67},
  issn       = {1089-7801},
  number     = {3},
  pages      = {10--12},
  volume     = {12},
  address    = {Piscataway, NJ, USA},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MIC.2008.67},
  groups     = {TestOne},
  journal    = {IEEE Internet Computing},
  publisher  = {IEEE Educational Activities Department},
  year       = {2008},
}

@Article{820136,
  author     = {Tony Clear},
  title      = {Design and usability in security systems: daily life as a context of use?},
  journal    = {SIGCSE Bull.},
  year       = {2002},
  volume     = {34},
  number     = {4},
  pages      = {13--14},
  issn       = {0097-8418},
  doi        = {http://doi.acm.org/10.1145/820127.820136},
  address    = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/820127.820136},
  publisher  = {ACM},
  readstatus = {skimmed},
}

@BOOK{1098730,
  title = {Security and Usability},
  publisher = {O'Reilly Media, Inc.},
  year = {2005},
  author = {Lorrie Cranor and Simson Garfinkel},
  isbn = {0596008279}
}

@INPROCEEDINGS{1143122,
  author = {Alexander J. DeWitt and Jasna Kuljis},
  title = {Aligning usability and security: a usability study of Polaris},
  booktitle = {SOUPS '06: Proceedings of the second symposium on Usable privacy
	and security},
  year = {2006},
  pages = {1--7},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1143120.1143122},
  doi = {http://doi.acm.org/10.1145/1143120.1143122},
  isbn = {1-59593-448-0},
  location = {Pittsburgh, Pennsylvania}
}

@InProceedings{1233448,
  author     = {Cheryl Hinds and Chinedu Ekwueme},
  booktitle  = {ACM-SE 45: Proceedings of the 45th annual southeast regional conference},
  title      = {Increasing security and usability of computer systems with graphical passwords},
  doi        = {http://doi.acm.org/10.1145/1233341.1233448},
  isbn       = {978-1-59593-629-5},
  location   = {Winston-Salem, North Carolina},
  pages      = {529--530},
  publisher  = {ACM},
  abstract   = {Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec id bibendum magna, ac tristique nulla. Aliquam ut vulputate velit, ac vulputate leo. Sed malesuada nisi eget lacus rhoncus, et feugiat libero suscipit. Sed vitae ultricies diam. Phasellus arcu tellus, scelerisque a lorem quis, molestie fermentum mi. Morbi nibh ante, sodales at nisl nec, tincidunt dapibus leo. Praesent auctor egestas commodo. Cras elit erat, accumsan a felis at, malesuada iaculis risus. Nunc in tincidunt metus.},
  address    = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1233341.1233448},
  groups     = {StaticGroup, TestOneSubOne},
  year       = {2007},
}

@Article{10250999,
  author     = {von Hippel, Eric and Reagle, Jr., Joseph M. and Sherry, John F., Jr. and van den Huevel, Jr., Johan A},
  title      = {Article with complex Authornames},
  journal    = {IEEE Security and Privacy},
  year       = {2004},
  volume     = {2},
  number     = {5},
  pages      = {25--31},
  issn       = {1540-7993},
  doi        = {http://dx.doi.org/10.1109/MSP.2004.81},
  address    = {Piscataway, NJ, USA},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MSP.2004.81},
  priority   = {prio2},
  publisher  = {IEEE Educational Activities Department},
}

@InProceedings{1314293,
  author     = {Mariusz H. Jakubowski and Ramarathnam Venkatesan},
  title      = {Randomized radon transforms for biometric authentication via fingerprint hashing},
  booktitle  = {DRM '07: Proceedings of the 2007 ACM workshop on Digital Rights Management},
  year       = {2007},
  publisher  = {ACM},
  location   = {Alexandria, Virginia, USA},
  isbn       = {978-1-59593-884-8},
  pages      = {90--94},
  doi        = {http://doi.acm.org/10.1145/1314276.1314293},
  address    = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1314276.1314293},
  groups     = {StaticGroup},
}

@INPROCEEDINGS{1358810,
  author = {Vassilis Kostakos},
  title = {Human-in-the-loop: rethinking security in mobile and pervasive systems},
  booktitle = {CHI '08: CHI '08 extended abstracts on Human factors in computing
	systems},
  year = {2008},
  pages = {3075--3080},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1358628.1358810},
  doi = {http://doi.acm.org/10.1145/1358628.1358810},
  isbn = {978-1-60558-012-8},
  location = {Florence, Italy}
}

@INPROCEEDINGS{1137636,
  author = {Martin Naedele and Thomas E. Koch},
  title = {Trust and tamper-proof software delivery},
  booktitle = {SESS '06: Proceedings of the 2006 international workshop on Software
	engineering for secure systems},
  year = {2006},
  pages = {51--58},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137636},
  doi = {http://doi.acm.org/10.1145/1137627.1137636},
  isbn = {1-59593-411-1},
  location = {Shanghai, China}
}

@INPROCEEDINGS{1182529,
  author = {Ann Nosseir and Richard Connor and Crawford Revie and Sotirios Terzis},
  title = {Question-based authentication using context data},
  booktitle = {NordiCHI '06: Proceedings of the 4th Nordic conference on Human-computer
	interaction},
  year = {2006},
  pages = {429--432},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1182475.1182529},
  doi = {http://doi.acm.org/10.1145/1182475.1182529},
  isbn = {1-59593-325-5},
  location = {Oslo, Norway}
}

@INPROCEEDINGS{1073004,
  author = {Rog\'{e}rio de Paula and Xianghua Ding and Paul Dourish and Kari
	Nies and Ben Pillet and David Redmiles and Jie Ren and Jennifer Rode
	and Roberto Silva Filho},
  title = {Two experiences designing for effective security},
  booktitle = {SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and
	security},
  year = {2005},
  pages = {25--34},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1073001.1073004},
  doi = {http://doi.acm.org/10.1145/1073001.1073004},
  isbn = {1-59593-178-3},
  location = {Pittsburgh, Pennsylvania}
}

@INPROCEEDINGS{00000000,
  author = {Konstantin Rozinov},
  title = {Are Usability and Security Two Opposite Directions in Computer Systems?},
  year = {2004},
  bdsk-url-1 = {http://rozinov.sfs.poly.edu/papers/security_vs_usability.pdf},
  date-added = {2009-02-23 04:41:08 +0100},
  date-modified = {2009-02-23 04:42:54 +0100},
  rating = {2}
}

@INPROCEEDINGS{1251435,
  author = {Alma Whitten and J. D. Tygar},
  title = {Why Johnny can't encrypt: a usability evaluation of PGP 5.0},
  booktitle = {SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium},
  year = {1999},
  pages = {14--14},
  address = {Berkeley, CA, USA},
  publisher = {USENIX Association},
  location = {Washington, D.C.}
}

@INPROCEEDINGS{1137633,
  author = {Bart De Win and Frank Piessens and Wouter Joosen},
  title = {How secure is AOP and what can we do about it?},
  booktitle = {SESS '06: Proceedings of the 2006 international workshop on Software
	engineering for secure systems},
  year = {2006},
  pages = {27--34},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137633},
  doi = {http://doi.acm.org/10.1145/1137627.1137633},
  isbn = {1-59593-411-1},
  location = {Shanghai, China}
}

@ARTICLE{1025014,
  author = {Jeff Yan and Alan Blackwell and Ross Anderson and Alasdair Grant},
  title = {Password Memorability and Security: Empirical Results},
  journal = {IEEE Security and Privacy},
  year = {2004},
  volume = {2},
  pages = {25--31},
  number = {5},
  address = {Piscataway, NJ, USA},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MSP.2004.81},
  doi = {http://dx.doi.org/10.1109/MSP.2004.81},
  issn = {1540-7993},
  publisher = {IEEE Educational Activities Department}
}

@Comment{jabref-meta: databaseType:biblatex;}

@Comment{jabref-meta: fileDirectory:\\Literature\\;}

@Comment{jabref-meta: fileDirectory-defaultOwner-user:D:\\Documents;}

@Comment{jabref-meta: grouping:
0 AllEntriesGroup:;
1 StaticGroup:StaticGroup\;0\;1\;0x6d74baff\;\;A test static group\;;
1 KeywordGroup:DynamicGroup\;0\;author\;Churchill\;0\;0\;0\;0x5eba7dff\;\;\;;
1 AutomaticPersonsGroup:Automatic group (Authors)\;0\;author\;0\;\;\;Automatic group for all authors\;;
1 StaticGroup:TestOne\;0\;1\;0x311b92ff\;\;\;;
2 StaticGroup:TestOneSubOne\;0\;1\;0xff7043ff\;\;\;;
2 StaticGroup:TestOneSubTwo\;0\;1\;0x00bcd4ff\;\;\;;
1 StaticGroup:TestTwo\;0\;0\;0x5d4037ff\;\;\;;
}

@Comment{jabref-meta: keypattern_article:articleTest;}

@Comment{jabref-meta: keypatterndefault:[authors3][year];}

@Comment{jabref-meta: protectedFlag:true;}

@Comment{jabref-meta: saveOrderConfig:specified;author;false;address;false;citationkey;false;}

@Comment{jabref-meta: selector_organization:JabRef Developers;JabRef Publisher;}

Some trailing text
