{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:30:07Z","timestamp":1725888607467},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_23","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:14:17Z","timestamp":1496110457000},"page":"390-397","source":"Crossref","is-referenced-by-count":1,"title":["Update-Tolerant and Revocable Password Backup"],"prefix":"10.1007","author":[{"given":"Moritz","family":"Horsch","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Metz","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Blocki, J., Komanduri, S., Cranor, L.F., Datta, A.: Spaced repetition and mnemonics enable recall of multiple strong passwords. In: Proceeding of NDSS (2015)","DOI":"10.14722\/ndss.2015.23094"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In: Proceeding of IEEE SP (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"23_CR3","unstructured":"Flor\u00eancio, D., Herley, C., van Oorschot, P.C.: Password portfolios and the finite-effort user: sustainably managing large numbers of accounts. In: Proceeding of USENIX Security Symposium (2014)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceeding of WWW (2005)","DOI":"10.1145\/1060745.1060815"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Horsch, M., Braun, J., Metz, D., Buchmann, J.: Update-tolerant and revocable password backup (extended version). CoRR, abs\/1704.02883 (2017)","DOI":"10.1007\/978-3-319-59870-3_23"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Horsch, M., H\u00fclsing, A., Buchmann, J.: PALPAS - PAsswordLess PAssword synchronization. In: Proceeding of ARES (2015)","DOI":"10.1109\/ARES.2015.23"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-319-40253-6_26","volume-title":"Information Security and Privacy","author":"M Horsch","year":"2016","unstructured":"Horsch, M., Schlipf, M., Braun, J., Buchmann, J.: Password requirements markup language. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 426\u2013439. Springer, Cham (2016). doi: 10.1007\/978-3-319-40253-6_26"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-24209-0_16","volume-title":"Information Security and Cryptology - ICISC 2010","author":"A Karole","year":"2011","unstructured":"Karole, A., Saxena, N., Christin, N.: A comparative usability evaluation of traditional password managers. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 233\u2013251. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-24209-0_16"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Kiesel, J., Stein, B., Lucks, S.: A large-scale analysis of the mnemonic password advice. In: Proceeding of NDSS (2017)","DOI":"10.14722\/ndss.2017.23077"},{"key":"23_CR10","unstructured":"LastPass Corporate. LastPass Security Notification, June 2015. https:\/\/blog.lastpass.com\/2015\/06\/lastpass-security-notice.html\/"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-319-45931-8_16","volume-title":"Information Security Theory and Practice","author":"F Al Maqbali","year":"2016","unstructured":"Al Maqbali, F., Mitchell, C.J.: Password generators: old ideas and new. In: Foresti, S., Lopez, J. (eds.) WISTP 2016. LNCS, vol. 9895, pp. 245\u2013253. Springer, Cham (2016). doi: 10.1007\/978-3-319-45931-8_16"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Shay, R., Bauer, L., Christin, N., Cranor, L.F., Forget, A., Komanduri, S., Mazurek, M.L., Melicher, W., Segreti, S.M., Ur, B.: A spoonful of sugar?: The impact of guidance and feedback on password-creation behavior. In: Proceeding of CHI (2015)","DOI":"10.1145\/2702123.2702586"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Ziegler, D., Rauter, M., Stromberger, C., Teufl, P., Hein, D.M.: Do you think your passwords are secure? In: Proceeding of PRISMS (2014)","DOI":"10.1109\/PRISMS.2014.6970600"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T06:50:49Z","timestamp":1569394249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}