{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:04:25Z","timestamp":1726002265161},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_21","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T15:52:06Z","timestamp":1544025126000},"page":"407-426","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["drPass: A Dynamic and Reusable Password Generator Protocol"],"prefix":"10.1007","author":[{"given":"Suryakanta","family":"Panda","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"21_CR1","unstructured":"Basic password security requirement. https:\/\/www.tripwire.com\/state-of-security\/latest-security-news\/nearly-half-popular-consumer-websites-lack-basic-password-security-requirements\/"},{"key":"21_CR2","unstructured":"Keepass. https:\/\/keepass.info\/"},{"key":"21_CR3","unstructured":"The password meter. http:\/\/www.passwordmeter.com"},{"key":"21_CR4","unstructured":"Phishing activity trends report, second quarter (2016). http:\/\/www.antiphishing.org\/"},{"key":"21_CR5","unstructured":"Poor password requirements of popular consumer websites. https:\/\/betanews.com\/2017\/08\/09\/consumer-websites-poor-passwords\/"},{"key":"21_CR6","unstructured":"Yet another password meter. http:\/\/www.yetanotherpasswordmeter.com"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In 2012 IEEE Symposium on Security and Privacy, pp. 553\u2013567. IEEE (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"21_CR8","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: A usability study and critique of two password managers. In: Usenix Security, vol. 6 (2006)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.: The tangled web of password reuse. In: NDSS, vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23357"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"21_CR11","unstructured":"Flor\u00eancio, D., Herley, C., Coskun, B.: Do strong web passwords accomplish anything? HotSec, 7(6) (2007)"},{"issue":"7","key":"21_CR12","first-page":"1678","volume":"8","author":"H Gao","year":"2013","unstructured":"Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. J. Softw. 8(7), 1678\u20131698 (2013)","journal-title":"J. Softw."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceedings of the 14th International Conference On World Wide Web, pp. 471\u2013479. ACM (2005)","DOI":"10.1145\/1060745.1060815"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-03549-4_14","volume-title":"Financial Cryptography and Data Security","author":"C Herley","year":"2009","unstructured":"Herley, C., van Oorschot, P.C., Patrick, A.S.: Passwords: if we\u2019re so smart, why are we still using them? In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 230\u2013237. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_14"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM 47(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"John, B.E.: Extensions of GOMS analyses to expert performance requiring perception of dynamic visual and auditory information. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 107\u2013116. ACM (1990)","DOI":"10.1145\/97243.97262"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"John, B.E., Gray, W.D.: CPM-GOMS: an analysis method for tasks with parallel activities. In: Conference companion on Human factors in computing systems, pp. 393\u2013394. ACM (1995)","DOI":"10.1145\/223355.223738"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Kontaxis, G., Athanasopoulos, E., Portokalidis, G., Keromytis, A.D.: Sauth: protecting user accounts from password database leaks. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 187\u2013198. ACM (2013)","DOI":"10.1145\/2508859.2516746"},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TSMC.2013.2270227","volume":"44","author":"T Kwon","year":"2014","unstructured":"Kwon, T., Shin, S., Na, S.: Covert attentional shoulder surfing: human adversaries are more powerful than expected. IEEE Trans. Systems, Man, Cybern.: Syst. 44(6), 716\u2013727 (2014)","journal-title":"IEEE Trans. Systems, Man, Cybern.: Syst."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Li, Z., He, W., Akhawe, D., Song, D.: The emperor\u2019s new password manager: security analysis of web-based password managers. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 465\u2013479 (2014)","DOI":"10.21236\/ADA614474"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-49806-5_4","volume-title":"Information Systems Security","author":"A Maheshwari","year":"2016","unstructured":"Maheshwari, A., Mondal, S.: SPOSS: secure pin-based-authentication obviating shoulder surfing. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 66\u201386. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49806-5_4"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Mainka, C., Mladenov, V., Feldmann, F., Krautwald, J., Schwenk, J.: Your software at my service (2014)","DOI":"10.1145\/2664168.2664172"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"M Mannan","year":"2007","unstructured":"Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 88\u2013103. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77366-5_11"},{"key":"21_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11889663_1","volume-title":"Financial Cryptography and Data Security","author":"B Parno","year":"2006","unstructured":"Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 1\u201319. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11889663_1"},{"key":"21_CR25","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: Usenix security, pp. 17\u201332, Baltimore, MD, USA (2005)"},{"key":"21_CR26","unstructured":"Silver, D., Jana, S., Boneh, D., Chen, E., Jackson, C.: password managers: attacks and defenses. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 449\u2013464 (2014)"},{"issue":"2","key":"21_CR27","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/TIFS.2011.2169958","volume":"7","author":"H-M Sun","year":"2012","unstructured":"Sun, H.-M., Chen, Y.-H., Lin, Y.-H.: opass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans. Inf. Forensics Secur. 7(2), 651\u2013663 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Van Bruggen, D., Liu, S., Kajzer, M., Striegel, A., Crowell, C.R., D\u2019Arcy, J.: Modifying smartphone user locking behavior. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, pp. 10. ACM (2013)","DOI":"10.1145\/2501604.2501614"},{"key":"21_CR29","unstructured":"Strahs, B., Yue, C., Wang, H.: Secure passwords through enhanced hashing. In: Proceedings of LISA 2009: 23rd Large Installation System Administration Conference, pp. 93 (2009)"},{"issue":"1-2","key":"21_CR30","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"Susan Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C. Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. In: International Journal of Human-Computer Studies, 63(1), 102\u2013127 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"21_CR31","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/JSYST.2012.2183755","volume":"8","author":"Y Xiao","year":"2014","unstructured":"Xiao, Y., Li, C.-C., Lei, M., Vrbsky, S.V.: Differentiated virtual passwords, secret little functions, and codebooks for protecting users from password theft. IEEE Syst. J. 8(2), 406\u2013416 (2014)","journal-title":"IEEE Syst. J."},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2014.10.008","volume":"48","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Han, J., Li, Y., Zhou, J., Deng, R.H.: Leakage-resilient password entry: challenges, design, and evaluation. Comput. Secur. 48, 196\u2013211 (2015)","journal-title":"Comput. Secur."},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Yee, K.-P., Sitaker, K.: Passpet: convenient password management and phishing protection. In: Proceedings of the second symposium on Usable privacy and security, pp. 32\u201343. ACM (2006)","DOI":"10.1145\/1143120.1143126"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:27:22Z","timestamp":1573072042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}