{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:53:31Z","timestamp":1743087211723,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_14","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"212-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dear Password, I Know You Too Well"],"prefix":"10.1007","author":[{"given":"Frans F.","family":"Blauw","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"14_CR1","unstructured":"hashcat. https:\/\/hashcat.net\/"},{"key":"14_CR2","unstructured":"Amazon: Amazon EC2 Pricing (2016). https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/"},{"key":"14_CR3","unstructured":"animalnewyork: Watch Artist Implant a Net Art RFID Chip Into His Hand (2013). https:\/\/www.youtube.com\/watch?v=XECHcbakMIg"},{"issue":"4","key":"14_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367\u2013397 (2002). http:\/\/doi.acm.org\/10.1145\/581271.581272","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"14_CR5","unstructured":"Bowes, R.: Passwords - SkullSecurity. https:\/\/wiki.skullsecurity.org\/index.php?title=Passwords"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-1-4471-0515-2_27","volume-title":"People and Computers XIV \u2013 Usability or Else!","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? A field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV \u2013 Usability or Else!, pp. 405\u2013424. Springer, London (2000). doi:10.1007\/978-1-4471-0515-2_27"},{"key":"14_CR7","unstructured":"Cellan-Jones, R.: Office puts chips under staff\u2019s skin (2015). http:\/\/www.bbc.com\/news\/technology-31042477"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s10623-015-0071-9","volume":"77","author":"S Chiasson","year":"2015","unstructured":"Chiasson, S., van Oorschot, P.C.: Quantifying the security advantage of password expiration policies. Des. Codes Crypt. 77(2), 401\u2013408 (2015). http:\/\/dx.doi.org\/10.1007\/s10623-015-0071-9","journal-title":"Des. Codes Crypt."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Conti, V., Vitabile, S., Vitello, G., Sorbello, F.: An embedded biometric sensor for ubiquitous authentication. In: AEIT Annual Conference 2013, pp. 1\u20136 (2013)","DOI":"10.1109\/AEIT.2013.6666815"},{"key":"14_CR10","unstructured":"Cox, J.: Websites, please stop blocking password managers. It\u2019s 2015 (2015). https:\/\/www.wired.com\/2015\/07\/websites-please-stop-blocking-password-managers-2015\/"},{"key":"14_CR11","unstructured":"Duo: comparing the total cost of ownership of two-factor authentication solutions (2016). https:\/\/duo.com\/blog\/comparing-the-total-cost-of-ownership-of-two-factor-authentication-solutions"},{"key":"14_CR12","unstructured":"Google: SHAttered. https:\/\/shattered.io\/"},{"key":"14_CR13","unstructured":"Greenberg, A.: RFID chip implantation (2012). https:\/\/www.youtube.com\/watch?v=sKVj2V4-yPE"},{"key":"14_CR14","unstructured":"Herley, C., Schechter, S.: Breaking our password hash habit (2013). https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/SchechterHerleyWEIS2013.pdf"},{"key":"14_CR15","unstructured":"IMDB: Rogue One: A Star Wars Story. http:\/\/www.imdb.com\/title\/tt3748528\/"},{"key":"14_CR16","unstructured":"IMDB: Star Wars: The Force Awakens. http:\/\/www.imdb.com\/title\/tt2488496\/"},{"key":"14_CR17","unstructured":"Knapton, S.: Why your fingerprints may not be unique (2016). http:\/\/www.telegraph.co.uk\/science\/2016\/03\/14\/why-your-fingerprints-may-not-be-unique\/"},{"key":"14_CR18","unstructured":"Kotadia, M.: Microsoft security guru: jot down your passwords (2005). https:\/\/www.cnet.com\/news\/microsoft-security-guru-jot-down-your-passwords\/"},{"key":"14_CR19","unstructured":"Lauren, V.: Introducing the psychology of passwords. https:\/\/blog.lastpass.com\/2016\/09\/infographic-introducing-the-psychology-of-passwords.html"},{"key":"14_CR20","unstructured":"McMillan, R.: The world\u2019s first computer password? It was useless too (2012). https:\/\/www.wired.com\/2012\/01\/computer-password\/"},{"key":"14_CR21","unstructured":"Microsoft: password policy. https:\/\/technet.microsoft.com\/en-us\/library\/hh994572(v=ws.11).aspx"},{"key":"14_CR22","unstructured":"Openwall: John the Ripper. http:\/\/www.openwall.com\/john\/"},{"key":"14_CR23","unstructured":"Palermo, E.: Should you use a password manager? (2014). www.tomsguide.com\/us\/password-manager-pros-cons,news-19018.html"},{"key":"14_CR24","unstructured":"Passfaces Corporation: PassfacesTM: Two Factor Authentication for the Enterprise. http:\/\/www.passfaces.com\/"},{"key":"14_CR25","volume-title":"Biometric Recognition: Challenges and Opportunities","author":"JN Pato","year":"2010","unstructured":"Pato, J.N., Millett, L.I.: Biometric Recognition: Challenges and Opportunities. The National Academies Press, Washington, D.C. (2010)"},{"key":"14_CR26","unstructured":"Polybius: Daily Orders and Watchwords. www.perseus.tufts.edu\/hopper\/text?doc=Perseus%3Atext%3A1999.01.0234%3Abook%3D6%3Achapter%3D34"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-11925-5_1","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"B Preneel","year":"2010","unstructured":"Preneel, B.: The first 30 years of cryptographic hash functions and the NIST SHA-3 competition. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 1\u201314. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-11925-5_1"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC\/DMSEC 2004, pp. 1\u20138. ACM, New York (2004). http:\/\/doi.acm.org\/10.1145\/1029208.1029210","DOI":"10.1145\/1029208.1029210"},{"key":"14_CR29","unstructured":"SANS Institute: Biometrics and User Authentication (2002). https:\/\/www.sans.org\/reading-room\/whitepapers\/authentication\/biometrics-user-authentication-122"},{"key":"14_CR30","unstructured":"Sacha, B.: Let them paste passwords. https:\/\/www.ncsc.gov.uk\/blog-post\/let-them-paste-passwords"},{"key":"14_CR31","unstructured":"Schneier, B.: Write down your password (2005). https:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html"},{"key":"14_CR32","doi-asserted-by":"publisher","first-page":"2452","DOI":"10.1016\/j.cub.2015.08.016","volume":"25","author":"JC Selinger","year":"2015","unstructured":"Selinger, J.C., O\u2019Connor, S.M., Wong, J.D., Donelan, J.M.: Humans can continuously optimize energetic cost during walking. Curr. Biol. 25, 2452\u20132456 (2015)","journal-title":"Curr. Biol."},{"key":"14_CR33","unstructured":"Silver, D., Jana, S., Boneh, D., Chen, E., Jackson, C.: Password managers: attacks and defenses. In: Proceedings of the 23rd USENIX Conference on Security Symposium, SEC 2014, pp. 449\u2013464. USENIX Association, Berkeley (2014). http:\/\/dl.acm.org\/citation.cfm?id=2671225.2671254"},{"key":"14_CR34","unstructured":"Titcomb, J.: Do you have one of the most common passwords? They\u2019re ridiculously easy to guess (2016). www.telegraph.co.uk\/technology\/2016\/01\/26\/most-common-passwords-revealed---and-theyre-ridiculously-easy-to\/"},{"key":"14_CR35","unstructured":"Um, D.: GPU based password cracking with Amazon EC2 and oclHashcat (2015). www.rockfishsec.com\/2015\/05\/gpu-password-cracking-with-amazon-ec2.html"},{"key":"14_CR36","unstructured":"Unicode Inc: Unicode 9.0.0 (2016). http:\/\/unicode.org\/versions\/Unicode9.0.0\/"},{"key":"14_CR37","unstructured":"Wikipedia: Password, December 2016. https:\/\/en.wikipedia.org\/wiki\/Password#.22The_Password_is_dead.22"},{"key":"14_CR38","volume-title":"Biometrics: Identity Assurance in the Information Age","author":"JD Woodward","year":"2002","unstructured":"Woodward, J.D., Orlans, N.M., Higgins, P.T.: Biometrics: Identity Assurance in the Information Age. McGraw Hill Professional, New York City (2002)"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Monrose, F., Reiter, M.K.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 176\u2013186. ACM, New York (2010). http:\/\/doi.acm.org\/10.1145\/1866307.1866328","DOI":"10.1145\/1866307.1866328"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:56:06Z","timestamp":1625104566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_14"}},"subtitle":["A Congenial Call for Ubiquitous Authentication"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}