{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:30:08Z","timestamp":1725485408677},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443094"},{"type":"electronic","value":"9783540458319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45831-x_3","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T19:19:06Z","timestamp":1180811946000},"page":"30-39","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Approach to Proactive Password Checking"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Paolo","family":"D\u2019Arco","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"issue":"1","key":"3_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/290163.290164","volume":"1","author":"F. Bergadano","year":"1998","unstructured":"F. Bergadano, B. Crispo, and G. Ruffo, High Dictionary Compression for Proactive Password Checking, ACM Transactions on Information and System Security, Vol. 1, No. 1, pp. 3\u201325, November 1998.","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"R. Beale and T. Jackson, Neural Computing: An Introduction, IOP Publishing Ltd, Institute of Physics, 1990.","DOI":"10.1887\/0852742622"},{"key":"3_CR3","unstructured":"M. Bishop, Proactive Password Checking, in Proceedings of 4thWorkshop on Computer Security Incident Handling, 1992."},{"issue":"3","key":"3_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0167-4048(95)00003-Q","volume":"14","author":"M. Bishop","year":"1995","unstructured":"M. Bishop, Improving System Security via Proactive Password Checking, Computers and Security, Vol. 14, No. 3, pp. 233\u2013249, 1995.","journal-title":"Computers and Security"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"B. Bloom, Space\/Time Trade-offs in Hash Coding with Allowable Errors, Communications of ACM, July 1970.","DOI":"10.1145\/362686.362692"},{"key":"3_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Hyppocrates: A new Proactive Password Checker","author":"C. Blundo","year":"2001","unstructured":"C. Blundo, P. D\u2019Arco, A. De Santis, and C. Galdi, Hyppocrates: A new Proactive Password Checker, Proocedings of ISC01, Springer-Verlag, LNCS, Vol. 2200, Malaga, October 1\u20133, 2001."},{"key":"3_CR7","unstructured":"C. Davies, and R. Ganesan, Bapasswd: A new proactive password checker. In Proceedings of the 16th National Conference on Computer Security (Baltimore, MD, Sept. 20\u201323)."},{"key":"3_CR8","unstructured":"D. Klein, Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proceedings of the Fifth Data Communications Symposium, September 1977."},{"key":"3_CR9","unstructured":"A. Muffett, Crack 5.0, USENETNews."},{"key":"3_CR10","unstructured":"J. B. Nagle, An obvious password detector. USENETNews."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"E. Spafford, OPUS: Preventing Weak Password Choices in Computers and Security, No. 3, 1992.","DOI":"10.1016\/0167-4048(92)90207-8"}],"container-title":["Lecture Notes in Computer Science","Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45831-X_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:30:32Z","timestamp":1556454632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45831-X_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443094","9783540458319"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-45831-x_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}