{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:27:36Z","timestamp":1725564456122},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540224204"},{"type":"electronic","value":"9783540278092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27809-2_5","type":"book-chapter","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T03:28:35Z","timestamp":1283830115000},"page":"39-53","source":"Crossref","is-referenced-by-count":6,"title":["Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop"],"prefix":"10.1007","author":[{"given":"S.","family":"Stubblebine","sequence":"first","affiliation":[]},{"given":"P. C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Abadi, M., Burrows, M., Manasse, M., Wobber, T.: Moderately Hard, Memorybound Functions. In: NDSS 2003, San Diego (February 2003)","key":"5_CR1"},{"key":"5_CR2","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)"},{"doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attack. In: Proc. IEEE Symp. Research in Security and Privacy, Oakland (May 1992)","key":"5_CR3","DOI":"10.1109\/RISP.1992.213269"},{"doi-asserted-by":"crossref","unstructured":"Byers, S., Rubin, A., Kormann, D.: Defending Against an Internet-based Attack on the Physical World. In: Workshop on Privacy in the Electronic Society (WPES 2002), Washington D.C. (November 21, 2002)","key":"5_CR4","DOI":"10.1145\/644527.644529"},{"unstructured":"CAPTCHA Project web site (first appeared: 2000), http:\/\/www.captcha.net\/","key":"5_CR5"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Info. Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. Info. Theory"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchange. Designs, Codes and Cryptography\u00a02, 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","first-page":"137","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 137\u2013147. Springer, Heidelberg (1993)"},{"unstructured":"Password Usage, Federal Information Processing Standards Publication 112, U.S. Department of Commerce, NIST (1985)","key":"5_CR9"},{"unstructured":"Automated Password Generator, FIPS Pub 112, U.S. Dept. Commerce (1993)","key":"5_CR10"},{"key":"5_CR11","volume-title":"9th Int\u2019l Workshop on Enabling Technologi (WET-ICE 2000)","author":"W. Ford","year":"2000","unstructured":"Ford, W., Kaliski, B.: Server-Assisted Generation of a Strong Secret from a Password. In: 9th Int\u2019l Workshop on Enabling Technologi (WET-ICE 2000), IEEE, Los Alamitos (2000)"},{"doi-asserted-by":"crossref","unstructured":"Gong, L.: Verifiable-text attacks in cryptographic protocols. In: 1990 IEEE INFOCOM, pp. 686\u2013693 (1990)","key":"5_CR12","DOI":"10.1109\/INFCOM.1990.91310"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, T., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE J. Selected Areas Comm.\u00a011, 648\u2013656 (1993)","journal-title":"IEEE J. Selected Areas Comm."},{"doi-asserted-by":"crossref","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communcations Review (October 1996)","key":"5_CR14","DOI":"10.1145\/242896.242897"},{"unstructured":"Juels, A., Brainard, J.: Client puzzles: A cryptographic defense against connection depletion attacks. In: Proceedings of the 1999 ISOC Network and Distributed System Security Symposium, pp. 151\u2013165 (1999)","key":"5_CR15"},{"key":"5_CR16","volume-title":"Network Security: Private Communication in a Public World","author":"C. Kaufman","year":"2002","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World, 2nd edn. Prentice Hall, Englewood Cliffs (2002)","edition":"2"},{"doi-asserted-by":"crossref","unstructured":"Lomas, T., Gong, L., Saltzer, J., Needham, R.: Reducing risks from poorly chosen keys. Operating Systems Review\u00a013, 14\u201318 (presented at 1989 ACM Symp. on Operating Systems Principles)","key":"5_CR17","DOI":"10.1145\/74850.74853"},{"key":"5_CR18","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"unstructured":"Naor, M.: Verification of a human in the loop or Identification via the Turing Test. unpublished manuscript (1997), Online version available at http:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human.ps","key":"5_CR19"},{"doi-asserted-by":"crossref","unstructured":"Pinkas, B., Sander, T.: Securing Passwords Against Dictionary Attacks. In: 2000 ACM Conf. on Computer and Communications Security, Wash. D.C. (2002)","key":"5_CR20","DOI":"10.1145\/586110.586133"},{"unstructured":"von Ahn, L.: Eurocrypt 2003 presentation of [22], Warsaw, Poland (May 6, 2003)","key":"5_CR21"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"},{"unstructured":"Wu, T.: The secure remote password protocol. In: Internet Society, Network and Distributed System Security symposium, NDSS 1998 (1998)","key":"5_CR23"},{"unstructured":"Wolverton, T.: Hackers find new way to bilk eBay users, CNET news.com 03\/25\/02","key":"5_CR24"},{"doi-asserted-by":"crossref","unstructured":"Yan, J.: A Note on Proactive Password Checking. In: Proc. 2001 ACM New Security Paradigms Workshop, New Mexico, USA (September 2001)","key":"5_CR25","DOI":"10.1145\/508171.508194"},{"unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: The Memorability and Security of Passwords \u2013 Some Empirical Results, Tech. Report 500, Computer Lab, Cambridge (2000), http:\/\/www.ftp.cl.cam.ac.uk\/ftp\/rja14\/tr500.pdf","key":"5_CR26"},{"key":"5_CR27","volume-title":"The Official PGP User\u2019s Guide","author":"P. Zimmermann","year":"1995","unstructured":"Zimmermann, P.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27809-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T23:21:21Z","timestamp":1559604081000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27809-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540224204","9783540278092"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27809-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}