{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:40:06Z","timestamp":1773409206375,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642154966","type":"print"},{"value":"9783642154973","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15497-3_18","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T14:51:46Z","timestamp":1283352706000},"page":"286-302","source":"Crossref","is-referenced-by-count":62,"title":["Kamouflage: Loss-Resistant Password Management"],"prefix":"10.1007","author":[{"given":"Hristo","family":"Bojinov","sequence":"first","affiliation":[]},{"given":"Elie","family":"Bursztein","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Boyen","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Boyen, X.: Halting password puzzles: hard-to-break encryption from human-memorable keys. In: 16th USENIX Security Symposium\u2014SECURITY 2007, pp. 119\u2013134 (2007)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Hidden credential retrieval from a reusable password. In: ACM Symp. on Information, Computer & Communication Security\u2014ASIACCS 2009, pp. 228\u2013238 (2009)","DOI":"10.1145\/1533057.1533089"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Das, V.V.: Honeypot scheme for distributed denial-of-service. In: International Conference on Advanced Computer Control, pp. 497\u2013501 (2009)","DOI":"10.1109\/ICACC.2009.146"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: Dynamic security skins. In: SOUPS 2005: Proceedings of the 2005 Symposium on Usable Privacy and Security, pp. 77\u201388 (2005)","DOI":"10.1145\/1073001.1073009"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/0-387-34805-0_6","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"D. Feldmeier","year":"1990","unstructured":"Feldmeier, D., Karn, P.: UNIX password security \u2013 10 years later. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 44\u201363. Springer, Heidelberg (1990)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/1242572.1242661","volume-title":"WWW 2007: Proceedings of the 16th International Conference on World Wide Web","author":"D. Florencio","year":"2007","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: WWW 2007: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM, New York (2007)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Ford, W., Kaliski, B.: Server-assisted generation of a strong secret from a password. In: Proc. 9th IEEE International Workshops on Enabling Technologies, pp. 176\u2013180 (2000)","DOI":"10.1109\/ENABL.2000.883724"},{"key":"18_CR8","unstructured":"Glodek, W.: Using a specialized grammar to generate probable passwords. Master\u2019s thesis, Florida state university (2008)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. In: Proceedings CHI 2002, pp. 868\u2013869 (2002)","DOI":"10.1145\/506443.506639"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1145\/1060745.1060815","volume-title":"WWW 2005: Proceedings of the 14th International Conference on World Wide Web","author":"J.A. Halderman","year":"2005","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: WWW 2005: Proceedings of the 14th International Conference on World Wide Web, pp. 471\u2013479. ACM Press, New York (2005)"},{"key":"18_CR11","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: Proc. 8th USENIX Security Symposium, pp. 135\u2013150 (1999)"},{"key":"18_CR12","unstructured":"Kausik, B.: Method and apparatus for cryptographically camouflaged cryptographic key. US patent 6170058 (2001)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space trade-off. In: Proc. of ACM CCS 2005, pp. 364\u2013372 (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"18_CR15","unstructured":"Account lockout attack (2009), http:\/\/www.owasp.org\/index.php\/Account_lockout_attack"},{"key":"18_CR16","unstructured":"Portokalidis, G., Bos, H.: Sweetbait: Zero-hour worm detection and containment using honeypots. Technical report, Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems, TR IR-CS-015. Technical report, Vrije Universiteit (2005)"},{"key":"18_CR17","unstructured":"Project, O.: John the ripper password cracker (2005), http:\/\/www.openwall.com\/john"},{"key":"18_CR18","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: Proceedings of USENIX security (2005)"},{"issue":"12","key":"18_CR19","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1016\/j.comcom.2009.03.005","volume":"32","author":"A. Sardana","year":"2009","unstructured":"Sardana, A., Joshi, R.: An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks. Comput. Commun.\u00a032(12), 1384\u20131399 (2009)","journal-title":"Comput. Commun."},{"key":"18_CR20","unstructured":"TechCrunch. One of the 32 million with a rockyou account? you may want to change all your passwords. like now (2009), http:\/\/techcrunch.com\/2009\/12\/14\/rockyou-hacked\/"},{"key":"18_CR21","unstructured":"Verisign. Personal identity portal (2008), https:\/\/pip.verisignlabs.com\/"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Glodek, B., de Medeiros, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of IEEE Security and Privacy (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Yampolskiy, R.: Analyzing user passwords selection behavior for reduction of password space. In: Proc. IEEE Int. Carnahan Conference on Security Technology, pp. 109\u2013115 (2006)","DOI":"10.1109\/CCST.2006.313438"},{"issue":"5","key":"18_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy magazine\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security and Privacy magazine"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15497-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T10:53:11Z","timestamp":1740480791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15497-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642154966","9783642154973"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15497-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}