{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:24:10Z","timestamp":1742912650935,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_24","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"356-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Decoy Password Vaults: At Least as Hard as Steganography?"],"prefix":"10.1007","author":[{"given":"Cecilia","family":"Pasquini","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-04431-1_2","volume-title":"Information Hiding","author":"R B\u00f6hme","year":"2009","unstructured":"B\u00f6hme, R.: An epistemological approach to steganography. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 15\u201330. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04431-1_2"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-642-15497-3_18","volume-title":"Computer Security \u2013 ESORICS 2010","author":"H Bojinov","year":"2010","unstructured":"Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 286\u2013302. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15497-3_18"},{"key":"24_CR3","unstructured":"Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge, May 2012"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C Cachin","year":"1998","unstructured":"Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306\u2013318. Springer, Heidelberg (1998). doi:10.1007\/3-540-49380-8_21"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Bonneau, J., Juels, A., Ristenpart, T.: Cracking-resistant password vaults using natural language encoders. In: IEEE Security and Privacy, pp. 481\u2013498 (2016)","DOI":"10.1109\/SP.2015.36"},{"issue":"3","key":"24_CR6","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: ACM International Conference on World Wide Web, pp. 656\u2013666 (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-30114-1_6","volume-title":"Information Hiding","author":"J Fridrich","year":"2004","unstructured":"Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67\u201381. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-30114-1_6"},{"key":"24_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Golla, M., Beuscher, B., D\u00fcrmuth, M.: On the security of cracking-resistant password vaults. In: ACM Conference on Computer and Communications Security, pp. 1230\u20131241 (2016)","DOI":"10.1145\/2976749.2978416"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Juels, A., Ristenpart, T.: Honey encryption: beyond the brute-force barriers. In: Advances in Cryptology - EUROCRYPT, pp. 293\u2013310 (2014)","DOI":"10.1007\/978-3-642-55220-5_17"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS# 5: Password-based cryptography specification version 2.0. RFC 2289 (2000)","DOI":"10.17487\/rfc2898"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Li, Z., He, W., Akhawe, D., Song, D.: The emperor\u2019s new password manager: security analysis of web-based password managers. In: USENIX Security Symposium, pp. 465\u2013479 (2014)","DOI":"10.21236\/ADA614474"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-60922-9_32","volume-title":"STACS 1996","author":"UM Maurer","year":"1996","unstructured":"Maurer, U.M.: A unified and generalized treatment of authentication theory. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol. 1046, pp. 387\u2013398. Springer, Heidelberg (1996). doi:10.1007\/3-540-60922-9_32"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-24624-4_12","volume-title":"Digital Watermarking","author":"P Sallee","year":"2004","unstructured":"Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154\u2013167. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24624-4_12"},{"key":"24_CR16","unstructured":"Silver, D., Jana, S., Boneh, D., Chen, E.: Password managers: attacks and defenses. In: USENIX Security Symposium, pp. 449\u2013464 (2014)"},{"issue":"3","key":"24_CR17","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0161-119291866883","volume":"16","author":"P Wayner","year":"1992","unstructured":"Wayner, P.: Mimic functions. Cryptologia 16(3), 193\u2013214 (1992)","journal-title":"Cryptologia"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:07:14Z","timestamp":1621642034000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_24","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}