{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:47:30Z","timestamp":1743119250287,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459301"},{"type":"electronic","value":"9783319459318"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45931-8_16","type":"book-chapter","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T07:26:19Z","timestamp":1474010779000},"page":"245-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Password Generators: Old Ideas and New"],"prefix":"10.1007","author":[{"given":"Fatma","family":"Al Maqbali","sequence":"first","affiliation":[]},{"given":"Chris J.","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"issue":"3\u20132","key":"16_CR1","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TIFS.2011.2116781","volume":"6","author":"R Biddle","year":"2011","unstructured":"Biddle, R., Mannan, M., van Oorschot, P.C., Whalen, T.: User study, analysis, and usable security of passwords based on digital objects. IEEE Trans. Inf. Foren. Secur. 6(3\u20132), 970\u2013979 (2011)","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"16_CR2","unstructured":"Cluley, G.: Lastpass vulnerability potentially exposed passwords for internet explorer users, August 2013. \n                      https:\/\/www.grahamcluley.com\/2013\/08\/lastpass-vulnerability\/"},{"key":"16_CR3","unstructured":"FIDO Alliance: FIDO UAF Protocol Specification v1.0: FIDO Alliance Proposed Standard 08, December 2014"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Ellis, A., Hagino, T. (eds.) Proceedings of the WWW 2005, pp. 471\u2013479. ACM, May 2005","DOI":"10.1145\/1060745.1060815"},{"key":"16_CR5","unstructured":"Horsch, M., H\u00fclsing, A., Buchmann, J.A.: PALPAS - passwordless password synchronization (2015). \n                      arXiv:1506.04549v1\n                      \n                     [cs.CR]. \n                      http:\/\/arxiv.org\/abs\/1506.04549"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-319-40253-6_26","volume-title":"Information Security and Privacy","author":"M Horsch","year":"2016","unstructured":"Horsch, M., Schlipf, M., Braun, J., Buchmann, J.A.: Password requirements markup language. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016, Part I. LNCS, vol. 9722, pp. 426\u2013439. Springer, Switzerland (2016)"},{"key":"16_CR7","unstructured":"Karp, A.H.: Site-specific passwords. Technical report HPL-2002-39 (R.1), HP Laboratories, Palo Alto, May 2003"},{"key":"16_CR8","unstructured":"Kelly, S.M.: Lastpass passwords exposed for some internet explorer users, mashableUK, August 2013. \n                      http:\/\/mashable.com\/2013\/08\/19\/lastpass-password-bug\/"},{"issue":"4","key":"16_CR9","first-page":"28","volume":"37","author":"M Mannan","year":"2012","unstructured":"Mannan, M., van Oorschot, P.C.: Passwords for both mobile and desktop computers: ObPwd for Firefox and Android. USENIX; login 37(4), 28\u201337 (2012)","journal-title":"USENIX; login"},{"key":"16_CR10","unstructured":"Mannan, M., van Oorschot, P.C.: Digital objects as passwords. In: Provos, N. (ed.) Proceedings of the HotSec 2008. USENIX Association, July 2008"},{"key":"16_CR11","unstructured":"Mannan, M., Whalen, T., Biddle, R., van Oorschot, P.C.: The usable security of passwords based on digital objects: from design and analysis to user study. Technical report TR-10-02, School of Computer Sciemce, Carleton University, February 2010. \n                      https:\/\/www.scs.carleton.ca\/sites\/default\/files\/tr\/TR-10-02.pdf"},{"key":"16_CR12","unstructured":"McCarney, D.: Password managers: comparative evaluation, design, implementation and empirical analysis. Master\u2019s thesis, Carleton University, August 2013"},{"key":"16_CR13","unstructured":"Pauli, D.: KeePass looter: password plunderer rinses pwned sysadmins. The Register, November 2015. \n                      http:\/\/www.theregister.co.uk\/2015\/11\/03\/keepass_looter_the_password_plunderer_to_hose_pwned_sys_admins\/"},{"key":"16_CR14","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: McDaniel, P. (ed.) Proceedings of the 14th USENIX Security Symposium. USENIX Association, July\/August 2005"},{"key":"16_CR15","unstructured":"Wolf, R., Schneider, M.: The passwordsitter. Technical report, Fraunhofer Institute for Secure Information Technology (SIT), May 2006"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Yee, K.P., Sitaker, K.: Passpet: convenient password management and phishing protection. In: Cranor, L.F. (ed.) Proceedings of the SOUPS 2006. ACM International Conference Proceeding Series, vol. 149, pp. 32\u201343. ACM, July 2006","DOI":"10.1145\/1143120.1143126"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45931-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:26:04Z","timestamp":1600475164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45931-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459301","9783319459318"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45931-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}