{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:40Z","timestamp":1725564640507},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_119","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T16:41:05Z","timestamp":1283445665000},"page":"675-680","source":"Crossref","is-referenced-by-count":0,"title":["Securing Password File Using Bezier Curves"],"prefix":"10.1007","author":[{"given":"Sunil","family":"Khurana","sequence":"first","affiliation":[]},{"given":"Sunil Kumar","family":"Khatri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"119_CR1","doi-asserted-by":"crossref","unstructured":"Jablon, D.P.: Strong Password-Only Authenticated Key Exchange. In: ACM Computer Communication Review, Westboro (1996)","DOI":"10.1145\/242896.242897"},{"key":"119_CR2","unstructured":"Albataineh, M., En-Nouaary, A.: Strengthening Password Authentication Systems. In: Sixth International Network Conference, Plymouth (2006)"},{"key":"119_CR3","unstructured":"Chiasson, S., Biddle, R.: Issues in User Authentication. In: CHI Workshop Security User Studies Methodologies and Best Practices (2007)"},{"key":"119_CR4","unstructured":"Boroditsky, M.: Passlogix password schemes, \n                    \n                      http:\/\/www.passlogix.com"},{"key":"119_CR5","doi-asserted-by":"crossref","unstructured":"Lomas, M., Gong, L., Saltzer, J., Needham, R.: Reducing risks from poorly chosen keys. In: Proceedings of the 12th ACM Symposium on Operating System Principles, ACM Operating Systems Review, pp. 14\u201318 (1989)","DOI":"10.1145\/74850.74853"},{"key":"119_CR6","first-page":"13631","volume-title":"A Proposal for IEEE","author":"T. Kwon","year":"2000","unstructured":"Kwon, T.: Ultimate Solution to Authentication via Memorable Password. In: A Proposal for IEEE, p. 13631a. IEEE Press, Los Alamitos (2000)"},{"key":"119_CR7","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conference on Computer and Communications Security, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"issue":"6","key":"119_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"119_CR9","volume-title":"Handbook of applied cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Inc., Boca Raton (1997)"},{"key":"119_CR10","first-page":"1363","volume-title":"Contribution to IEEE","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Rogawayy, P.: The AuthA Protocol for Password-Based Authenticated Key Exchange. In: Contribution to IEEE, p. 1363. IEEE Press, California (2000)"},{"key":"119_CR11","doi-asserted-by":"crossref","unstructured":"Yan, J.: A Note on Proactive Password Checking. In: New Security Paradigms Workshop (2001)","DOI":"10.1145\/508171.508194"},{"key":"119_CR12","doi-asserted-by":"crossref","unstructured":"Yan, J.: A Note on Proactive Password Checking. In: New Security Paradigms Workshop (2001)","DOI":"10.1145\/508171.508194"},{"key":"119_CR13","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The Design and Analysis of Graphical Passwords. In: Proceedings of the 8th USENIX Security Symposium (1999)"},{"key":"119_CR14","unstructured":"RealUser, \n                    \n                      http:\/\/www.realuser.com"},{"key":"119_CR15","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S. Wiedenbecka","year":"2005","unstructured":"Wiedenbecka, S., Watersa, J., Birgetb, J., Camille, B.A., Memon, N.: PassPoints Design and Longitudinal Evaluation of a Graphical Password System. J. Human Computer Studies\u00a063, 102\u2013127 (2005)","journal-title":"J. Human Computer Studies"},{"issue":"2","key":"119_CR16","first-page":"91","volume":"7","author":"B. Hartanto","year":"2006","unstructured":"Hartanto, B., Santoso, B., Welly, S.: The Usage of Graphical Password As a Replacement To The Alphanumerical Password. J. Informatika\u00a07(2), 91\u201397 (2006)","journal-title":"J. Informatika"},{"issue":"3","key":"119_CR17","first-page":"205","volume":"2","author":"M. Kumar","year":"2006","unstructured":"Kumar, M., Katti, R.: A Hash-based Strong Password Authentication Protocol with User Anonymity. J. International Journal of Network Security\u00a02(3), 205\u2013209 (2006)","journal-title":"J. International Journal of Network Security"},{"issue":"11","key":"119_CR18","first-page":"2519","volume":"E85-B","author":"M. Chen","year":"2002","unstructured":"Chen, M., Ku, W.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Transactions on Communications\u00a0E85-B(11), 2519\u20132521 (2002)","journal-title":"IEICE Transactions on Communications"},{"key":"119_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-89641-8_10","volume-title":"Cryptology and Network Security","author":"M. Abdalla","year":"2008","unstructured":"Abdalla, M., Izabach\u00e8ne, M., Pointcheval, D.: Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 133\u2013148. Springer, Heidelberg (2008)"},{"key":"119_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/978-3-642-03356-8_39","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"M. Abdalla","year":"2009","unstructured":"Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth Projective Hashing for Conditionally Extractable Commitments. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol.\u00a05677, pp. 671\u2013689. Springer, Heidelberg (2009)"},{"key":"119_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-02384-2_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"M. Abdalla","year":"2009","unstructured":"Abdalla, M., Catalano, D., Chevalier, C., Pointcheval, D.: Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 254\u2013271. Springer, Heidelberg (2009)"},{"key":"119_CR22","unstructured":"Lashkari, A., Habibi, F.S.: A Survey On Usability And Security Features In Graphical User Authentication Algorithms. J. Computer Science and Network Security\u00a09(9) (September 2009)"},{"issue":"3","key":"119_CR23","first-page":"195","volume":"6","author":"K. Itoh","year":"1993","unstructured":"Itoh, K., Ohno, Y.: A curve fitting algorithm for character fonts. Electronic Publishing\u00a06(3), 195\u2013205 (1993)","journal-title":"Electronic Publishing"},{"key":"119_CR24","first-page":"54","volume-title":"Raster Imaging and Digital Typography II","author":"G. Avrahami","year":"1991","unstructured":"Avrahami, G., Pratt, V.: Sub-pixel edge detection in character digitization. In: Morris, R., Andre, J. (eds.) Raster Imaging and Digital Typography II, pp. 54\u201364. Cambridge University Press, Cambridge (1991)"},{"key":"119_CR25","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TPAMI.1979.4766876","volume":"1","author":"L. Davis","year":"1979","unstructured":"Davis, L.: Shape matching using relaxation techniques. IEEE Trans. PAMI\u00a01, 60\u201372 (1979)","journal-title":"IEEE Trans. PAMI"},{"key":"119_CR26","unstructured":"Perumal, V., Ramaswamy, J.: An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations (IJCSIS) International Journal of Computer Science and Information Security\u00a06(1) (2009)"},{"key":"119_CR27","doi-asserted-by":"crossref","unstructured":"Pal, S., Biswas, P.K., Abraham, A.: Face Recognition Using Interpolated Bezier Curve Based Representation. In: IEEE Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004 (2004) 0-7695-2108-8\/04","DOI":"10.1109\/ITCC.2004.1286424"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_119.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:05:21Z","timestamp":1619773521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_119","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}