{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:50Z","timestamp":1742913650454,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319402529"},{"type":"electronic","value":"9783319402536"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40253-6_26","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T19:00:31Z","timestamp":1467226831000},"page":"426-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Password Requirements Markup Language"],"prefix":"10.1007","author":[{"given":"Moritz","family":"Horsch","sequence":"first","affiliation":[]},{"given":"Mario","family":"Schlipf","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"key":"26_CR1","unstructured":"Anonymizer. https:\/\/www.anonymizer.com\/"},{"key":"26_CR2","unstructured":"Password requirements. http:\/\/passrequirements.com"},{"key":"26_CR3","unstructured":"TOR Project: Anonymity Online. https:\/\/www.torproject.org"},{"key":"26_CR4","unstructured":"TorGuard : online privacy protection services. https:\/\/torguard.net"},{"key":"26_CR5","first-page":"1","volume-title":"People and Computers XII","author":"A Adams","year":"1997","unstructured":"Adams, A., Sasse, M.A., Lunt, P.: Making Passwords Secure and Usable. In: Thimbleby, H., Conaill, B., Thomas, P.J. (eds.) People and Computers XII, pp. 1\u201319. Springer, London (1997)"},{"key":"26_CR6","unstructured":"Alexa Internet. The top 500 sites on the web. http:\/\/www.alexa.com\/topsites"},{"key":"26_CR7","unstructured":"AlFayyadh, B et al.: Improving usability of password management with standardized password policies, p. 8. Australia (2011)"},{"key":"26_CR8","unstructured":"Apache Software Foundation. Apache UIMA (2015). https:\/\/uima.apache.org\/"},{"issue":"3","key":"26_CR9","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0167-4048(95)00003-Q","volume":"14","author":"M Bishop","year":"1995","unstructured":"Bishop, M., Klein, D.V.: Improving system security via proactive password checking. Comput. Secur. 14(3), 233\u2013249 (1995)","journal-title":"Comput. Secur."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on Security and Privacy, SP 2012, pp. 538\u2013552. IEEE Computer Society, San Francisco, California, USA, 21\u201323 May 2012","DOI":"10.1109\/SP.2012.49"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCI.2014.2307227","volume":"9","author":"E Cambria","year":"2014","unstructured":"Cambria, E., White, B.: Jumping NLP curves: A review of natural language processing research [review article]. IEEE Comput. Int. Mag. 9(2), 48\u201357 (2014)","journal-title":"IEEE Comput. Int. Mag."},{"key":"26_CR12","unstructured":"Castelluccia, C., Abdelberi, C., D\u00fcrmuth, M., Perito, D.: When privacy meets security: leveraging personal information for password cracking. CoRR, abs\/1304.6584 (2013)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Dell\u2019Amico, M., Michiardi, P., Roudier, Y., Password strength: an empirical analysis. In: INFOCOM, pp. 983\u2013991. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5461951"},{"issue":"3\u20134","key":"26_CR14","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1017\/S1351324904003523","volume":"10","author":"DA Ferrucci","year":"2004","unstructured":"Ferrucci, D.A., Lally, A.: UIMA: an architectural approach to unstructured information processing in the corporate research environment. Nat. Lang. Eng. 10(3\u20134), 327\u2013348 (2004)","journal-title":"Nat. Lang. Eng."},{"key":"26_CR15","unstructured":"Flor\u00eancio, D. A. F., Herley, C.: A large-scale study of web password habits. In: Williamson, C. L., Zurko, M. E., Patel-Schneider, P. F., Shenoy, P. J. (eds.) Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 657\u2013666. ACM, Banff, Alberta, Canada, 8\u201312 May, 2007"},{"key":"26_CR16","unstructured":"Kelley, P.G., Komanduri, S., Mazurek, M.L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L.F., Lopez, J.: Guess again (and again, again): measuring password strength by simulating password-cracking algorithms. In: IEEE Symposium on Security and Privacy, SP 2012, pp. 523\u2013537. IEEE Computer Society, San Francisco, California, USA, 21\u201323 May, 2012"},{"key":"26_CR17","unstructured":"Nottingham, M., Hammer-Lahav, E.: Defining Well-Known Uniform Resource Identifiers (URIs), RFC 5785 (2010). https:\/\/tools.ietf.org\/html\/rfc5785"},{"key":"26_CR18","unstructured":"Quantcast. Quantcast Top Million U.S. Web Sites (2015). https:\/\/www.quantcast.com"},{"key":"26_CR19","unstructured":"RANDOM.ORG Ltd. RANDOM.ORG Password Generator. https:\/\/www.random.org\/passwords\/"},{"key":"26_CR20","unstructured":"Reichl, D.: KeePass Password Safe (2015). http:\/\/keepass.info"},{"issue":"4","key":"26_CR21","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10207-009-0084-3","volume":"8","author":"R Shay","year":"2009","unstructured":"Shay, R., Bertino, E.: A comprehensive simulation tool for the analysis of password policies. Int. J. Inf. Sec. 8(4), 275\u2013289 (2009)","journal-title":"Int. J. Inf. Sec."},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Shay, R., Bhargav-Spantzel, A., Bertino, E.: Password policy simulation and analysis. In: Digital Identity Management, pp. 1\u201310. ACM (2007)","DOI":"10.1145\/1314403.1314405"},{"key":"26_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-540-77048-0_30","volume-title":"Information and Communications Security","author":"AC Squicciarini","year":"2007","unstructured":"Squicciarini, A.C., Bhargav-Spantzel, A., Bertino, E., Czeksis, A.B.: Auth-SL - a system for the specification and enforcement of quality-based authentication policies. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 386\u2013397. Springer, Heidelberg (2007)"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-24192-0_4","volume-title":"Technology and Practice of Passwords","author":"F Stajano","year":"2015","unstructured":"Stajano, F., Spencer, M., Jenkinson, G., Stafford-Fraser, Q.: Password-Manager Friendly (PMF): semantic annotations to improve the effectiveness of password managers. In: Mj\u00f8lsnes, S.F., Forler, C., List, E., Lucks, S., Wenzel, J., D\u00fcrmuth, M., Kranz, T., Chang, D., Jati, A., Mishra, S., Sanadhya, S.K., Stajano, F., Spencer, M., Jenkinson, G., Stafford-Fraser, Q., Bicakci, K., Satiev, T., Tihanyi, N., Kov\u00e1cs, A., Vargha, G., L\u00e9n\u00e1rt, \u00c1., Jaeger, D., Graupner, H., Sapegin, A., Cheng, F., Meinel, C., Sandvoll, M., Boyd, C., Larsen, B.B., Kumar, A., Lauradoux, C., Millican, J. (eds.) PASSWORD 2014. LNCS, vol. 9393, pp. 61\u201373. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-24192-0_4"},{"key":"26_CR25","unstructured":"Thoeing, C.: PWGen (2015). http:\/\/pwgen-win.sourceforge.net"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-24177-7_23","volume-title":"Computer Security \u2013 ESORICS 2015","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, P.: The emperor\u2019s new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing. In: Pernul, G., et al. (eds.) ESORICS 2015, Part II. LNCS, vol. 9327, pp. 456\u2013477. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-24177-7_23"},{"key":"26_CR27","unstructured":"Weir, M., Aggarwal, S., Collins, M. P., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Al-Shaer, E., Keromytis, A. D., Shmatikov, V. (eds.). In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 162\u2013175. ACM, Chicago, Illinois, USA, 4\u20138 October, 2010"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., de Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: IEEE Symposium on Security and Privacy, pp. 391\u2013405. IEEE Computer Society (2009)","DOI":"10.1109\/SP.2009.8"},{"issue":"4","key":"26_CR29","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1080\/07421222.1999.11518226","volume":"15","author":"M Zviran","year":"1999","unstructured":"Zviran, M., Haga, W.J.: Password security: an empirical study. J. Manage. Inf. Syst. 15(4), 161\u2013186 (1999)","journal-title":"J. Manage. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40253-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T04:50:44Z","timestamp":1608007844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40253-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319402529","9783319402536"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40253-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}