{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:40:03Z","timestamp":1748522403025,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_8","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"83-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Human Generated Passwords \u2013 The Impacts of Password Requirements and Presentation Styles"],"prefix":"10.1007","author":[{"given":"Paul Y.","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yee-Yin","family":"Choong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM, New York (2007)","DOI":"10.1145\/1242572.1242661"},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3758\/BF03195438","volume":"33","author":"R Proctor","year":"2002","unstructured":"Proctor, R., Lien, M., Vu, K., Schultz, E., Salvendy, G.: Improving computer security for authentication of users: influence of proactive password restrictions. Behav. Res. Meth. Instrum. Comput. 33(2), 163\u2013169 (2002)","journal-title":"Behav. Res. Meth. Instrum. Comput."},{"issue":"8","key":"8_CR3","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"K Vu","year":"2007","unstructured":"Vu, K., Proctor, R., Bhargavspantzel, A., Tai, B., Cook, J., Eugeneschultz, E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. Comput. Stud. 65(8), 744\u2013757 (2007)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords.\u00a0In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 162\u2013175. ACM, New York (2010)","DOI":"10.1145\/1866307.1866327"},{"issue":"5","key":"8_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Secur. Priv. Mag. 2(5), 25\u201331 (2004)","journal-title":"IEEE Secur. Priv. Mag."},{"key":"8_CR6","unstructured":"Florencio, D., Herley, C., Oorschot, P.: An administrator\u2019s guide to internet password research. In: 28th Large Installation System Administration Conference. Usenix, Washington (2014)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Roman, V.Y.: Analyzing user password selection behavior for reduction of pass-word space. In: Proceedings 2006 40th Annual IEEE International,\u00a0pp. 109\u2013115. IEEE, New Jersey (2006)","DOI":"10.1109\/CCST.2006.313438"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Dhiman, M.: The benefits of understanding passwords. In: Proceedings of the 7th USENIX Workshop on Hot Topics in Security. Usenix, Washington (2012)","DOI":"10.1007\/978-1-4614-4878-5_2"},{"key":"8_CR9","unstructured":"Grawemeyer, B., Johnson, H.: How secure is your password? towards modelling human password creation. In: Proceedings of the First Trust Economics Workshop, pp. 15\u201318 (2009)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-319-07620-1_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Y-Y Choong","year":"2014","unstructured":"Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127\u2013137. Springer, Heidelberg (2014)"},{"key":"8_CR11","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: 8th USENIX Security Symposium, pp 1\u20131 (1999)"},{"issue":"2","key":"8_CR12","first-page":"2","volume":"10","author":"M Keith","year":"2009","unstructured":"Keith, M., Shao, B., Steinbart, P.: A behavioral analysis of passphrase design and effectiveness. J. Assoc. Inf. Syst. 10(2), 2 (2009)","journal-title":"J. Assoc. Inf. Syst."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Walker, R.C., Schloss, P., Vogel, C.A., Gordon, A.S., Fletcher, C.R., Walker, S.: Visual-syntactic text formatting: theoretical basis and empirical evidence for impact on human reading. In: Professional Communication Conference, pp 1\u201314 (2007)","DOI":"10.1109\/IPCC.2007.4464068"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Yu, C.-H., Miller, R.C.: Enhancing web page readability for non-native readers. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp 2523\u20132532 (2010)","DOI":"10.1145\/1753326.1753709"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/S0019-9958(61)80036-3","volume":"4","author":"C Bourne","year":"1961","unstructured":"Bourne, C., Ford, D.: A study of the statistics of letters in english words. Inf. Control 4(1), 48\u201367 (1961)","journal-title":"Inf. Control"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:22:36Z","timestamp":1748521356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}