{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:09:03Z","timestamp":1725487743399},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426622"},{"type":"electronic","value":"9783540454397"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45439-x_5","type":"book-chapter","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T13:44:53Z","timestamp":1185025493000},"page":"63-80","source":"Crossref","is-referenced-by-count":0,"title":["Hyppocrates A New Proactive Password Checker"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Paolo","family":"D\u2019Arco","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"5_CR1","volume-title":"Computer Security Threat Monitoring and Surveillance","author":"J. Anderson","year":"1980","unstructured":"J. Anderson. Computer Security Threat Monitoring and Surveillance. Fort Washington, PA: James P. Anderson Co. April 1980."},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/290163.290164","volume":"1","author":"F. Bergadano","year":"1998","unstructured":"F. Bergadano, B. Crispo and G. Ruffo. High Dictionary Compression for Proactive Password Checking. ACM Transactions on Information and System Security. Vol. 1, No. 1, November 1998, Pages 3\u201325.","journal-title":"ACM Transactions on Information and System Security"},{"key":"5_CR3","unstructured":"M. Bishop. Anatomy of a Proactive Password Checker. Proceedings of the Third UNIX Security Symposium, pp. 130\u2013139, September 1992."},{"key":"5_CR4","unstructured":"M. Bishop. Proactive Password Checking. Proceedings of the Fourth Workshop on Computer Security Incident Handling, pp. W11: 1\u20139 (Aug. 1992)."},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0167-4048(95)00003-Q","volume":"14","author":"M. Bishop","year":"1995","unstructured":"M. Bishop. Improving System Security via Proactive Password Checking. Computers and Security, 14(3) pp. 233\u2013249 (1995)","journal-title":"Computers and Security"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"M. Bishop. Password Management. Proceedings of COMPCON 1991, pp. 167\u2013169 (Feb. 1991).","DOI":"10.1109\/CMPCON.1991.128801"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"B. Bloom, Space\/Time Trade-offs in Hash Coding with Allowable Errors. Communications of ACM, July 1970.","DOI":"10.1145\/362686.362692"},{"key":"5_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Proceedings of Eurocrypt 2000","author":"V. Boyko","year":"2000","unstructured":"V. Boyko, P. MacKenzie, S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Proceedings of Eurocrypt 2000, LNCS vol. 1807, pp. 156\u2013171."},{"key":"5_CR9","volume-title":"Classification and Regression Trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone. Classification and Regression Trees. Wadsworth & Brooks\/Cole, 1984 Advanced Books & Software. Pacific Grove, CA."},{"key":"5_CR10","unstructured":"C. Davies and R. Ganesan. Bapasswd: A new proactive password checker. Proceedings of the 16th National Conference on Computer Security. Baltimore, MD, Sept. 20\u201323."},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","volume-title":"Proceedings of Eurocrypt 2001","author":"J. Katz","year":"2001","unstructured":"J. Katz, R. Ostrovsky, M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Proceedings of Eurocrypt 2001 LNCS vol. 2045, pp. 475\u2013495."},{"key":"5_CR12","unstructured":"D. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proceedings of the Fifth Data Communications Symposium. September 1977."},{"key":"5_CR13","unstructured":"A. Muffett. Crack 5.0. USENET News."},{"key":"5_CR14","unstructured":"J. B. Nagle. An Obvious Password Detector. USENET News 16, 60."},{"key":"5_CR15","first-page":"33","volume":"32","author":"B. C. Neuman","year":"1994","unstructured":"B. C. Neuman and T. Tso. Kerberos: an authentication service for computer networks. IEEE Trans. Commun., 32. 33\u201338, 1994.","journal-title":"IEEE Trans. Commun."},{"key":"5_CR16","volume-title":"Int. J. of Man Machine Studies","author":"J. R. Quinlan","year":"1987","unstructured":"J. R. Quinlan. Simplifying decision Trees, Int. J. of Man Machine Studies, 27 Academic Press Limited, London, 1987"},{"key":"5_CR17","unstructured":"J. R. Quinlan. C4.5: Program for Machine Learning, Morgan Kaufmann Publishers Inc., San Francisco, CA"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"J. Rissanen, Stochastic complexity and modeling, Ann. Stat. 14.3, 1080\u20131100.","DOI":"10.1214\/aos\/1176350051"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"E. Spafford. OPUS: Preventing Weak Password Choices. Computers and Security, No. 3, 1992","DOI":"10.1016\/0167-4048(92)90207-8"},{"key":"5_CR20","unstructured":"R. Stalling. Network and Internetwork Security. Prentice Hall, Englewood Cliffs, New Jersey"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45439-X_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T07:33:26Z","timestamp":1556696006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45439-X_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426622","9783540454397"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-45439-x_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}