{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T18:47:02Z","timestamp":1772218022990,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540689621","type":"print"},{"value":"9783540689638","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11961635_3","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T18:56:45Z","timestamp":1164653805000},"page":"37-55","source":"Crossref","is-referenced-by-count":24,"title":["Password Exhaustion: Predicting the End of Password Usefulness"],"prefix":"10.1007","author":[{"given":"Luke St.","family":"Clair","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Johansen","sequence":"additional","affiliation":[]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Pirretti","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"AMD 3-year technology outlook, http:\/\/www.amdcompare.com\/techoutlook\/"},{"key":"3_CR2","unstructured":"EFF DES cracker project, www.eff.org\/Privacy\/Crypto\/Crypto_misc\/DESCracker\/"},{"key":"3_CR3","unstructured":"John the ripper password cracker, http:\/\/www.openwall.com\/john\/"},{"key":"3_CR4","unstructured":"Number of words in the English language, http:\/\/hypertextbook.com\/facts\/2001\/JohnnyLing.shtml"},{"key":"3_CR5","unstructured":"pwgen CVS changelog, http:\/\/pwgen.cvs.sourceforge.net\/pwgen\/src\/ChangeLog?revision=1.8&view=markup"},{"key":"3_CR6","unstructured":"pwgen password generator, http:\/\/sourceforge.net\/projects\/pwgen\/"},{"key":"3_CR7","unstructured":"Sans institute, http:\/\/www.sans.org\/aboutsans.php"},{"key":"3_CR8","unstructured":"SANS password policies, http:\/\/www.sans.org\/resources\/policies\/"},{"key":"3_CR9","unstructured":"Unix cyrpt man page, http:\/\/bama.ua.edu\/cgi-bin\/man-cgi?crypt_unix+5"},{"key":"3_CR10","unstructured":"The magical number seven, plus or minus two: Some limits on our capacity for processing information (1956)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013156. Springer, Heidelberg (2000)"},{"issue":"5","key":"3_CR12","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"S.M. Bellovin","year":"1990","unstructured":"Bellovin, S.M., Merritt, M.: Limitations of the kerberos authentication system. SIGCOMM Comput. Commun. Rev.\u00a020(5), 119\u2013132 (1990)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"3_CR14","unstructured":"Borkar, S.Y., Dubey, P., Kahn, K.C., Kuck, D.J., Mulder, H., Pawlowski, S.S., Rattner, J.R., Ramanathan, R.M., Thomas, V.: Platform 2015: Intel Processor and Platform Evolution for the Next Decade. Technical report, Intel (2005)"},{"key":"3_CR15","unstructured":"Federal Fiancial Institutions\u00a0Examination Council. Authentication in an internet banking environment, http:\/\/federalreserve.gov\/boarddocs\/srletters\/2005\/SR0519a1.pdf"},{"key":"3_CR16","doi-asserted-by":"crossref","DOI":"10.4159\/9780674030107","volume-title":"Oversold and Underused: Computers in the Classroom","author":"L. Cuban","year":"2001","unstructured":"Cuban, L.: Oversold and Underused: Computers in the Classroom. Harvard University Press, Cambridge (2001)"},{"key":"3_CR17","unstructured":"Dubash, M.: Moore\u2019s Law is dead, says Gordon Moore (2005), http:\/\/www.techworld.com\/opsys\/news\/index.cfm?NewsID=3477"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1145\/1055626.1055646","volume":"33","author":"M. Ekman","year":"2005","unstructured":"Ekman, M., Warg, F., Nilsson, J.: An in-depth look at computer performance growth. SIGARCH Comput. Archit. News\u00a033(1), 144\u2013147 (2005)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/0-387-34805-0_6","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"D.C. Feldmeier","year":"1990","unstructured":"Feldmeier, D.C., Karn, P.R.: Unix password security - ten years later. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 44\u201363. Springer, Heidelberg (1990)"},{"key":"3_CR20","unstructured":"Hiremane, R.: From Moore\u2019s Law to Intel Innovation - Prediction to Reality. Technology@Intel Magazine (April 2005)"},{"key":"3_CR21","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The Design and Analysis of Graphic Passwords. In: Proceedings of the 8th Annual USENIX Security Symposium (1999)"},{"key":"3_CR22","unstructured":"Klein, D.V.: foiling the cracker \u2013 A survey of, and improvements to, password security. In: Proceedings of the second USENIX Workshop on Security, pp. 5\u201314 (Summer 1990)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, C.: RFC 1510: The Kerberos Network Authentication Service (V5). Status: PROPOSED STANDARD (September 1993)","DOI":"10.17487\/rfc1510"},{"key":"3_CR24","unstructured":"Lemos, R.: Passwords: The Weakest Link (2002), http:\/\/news.com.com\/2009-1001-916719.html"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via Keystroke Dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communication Security (1997)","DOI":"10.1145\/266420.266434"},{"issue":"11","key":"3_CR26","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM\u00a022(11), 594\u2013597 (1979)","journal-title":"Commun. ACM"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1145\/1102120.1102168","volume-title":"CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security","author":"A. Narayanan","year":"2005","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security, pp. 364\u2013372. ACM Press, New York (2005)"},{"key":"3_CR28","unstructured":"Provos, N., Mazi\u00e8res, D.: A Future-Adaptable Password Scheme. In: USENIX Annual Technical Conference, FREENIX Track, pp. 81\u201391 (1999)"},{"key":"3_CR29","unstructured":"Reinhold, A.G.: Results of a survey on pgp pass phrase usage, http:\/\/www.ecst.csuchico.edu\/atman\/Crypto\/misc\/pgp-passphrase-survey.html"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321 (Informational) (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"3_CR31","unstructured":"Summers, W.C., Bosworth, E.: Password policy: the good, the bad, and the ugly. In: WISICT 2004: Proceedings of the winter international synposium on Information and communication technologies, Trinity College Dublin, pp. 1\u20136 (2004)"},{"key":"3_CR32","unstructured":"Polk, W.T., Burr, W.E., Dodson, D.F.: Electronic authentication guidelines. NIST Special Publication 800-63"},{"key":"3_CR33","unstructured":"Wu, T.: The secure remote password protocol. In: Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, pp. 97\u2013111 (1998)"},{"key":"3_CR34","unstructured":"Wu, T.: A real-world analysis of Kerberos password security. In: Internet Society Network and Distributed System Security Symposium (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11961635_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T20:54:36Z","timestamp":1683665676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11961635_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540689621","9783540689638"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/11961635_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}