{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:56:41Z","timestamp":1725656201904},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275753"},{"type":"electronic","value":"9783642275760"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27576-0_26","type":"book-chapter","created":{"date-parts":[[2012,2,2]],"date-time":"2012-02-02T13:45:35Z","timestamp":1328190335000},"page":"315-330","source":"Crossref","is-referenced-by-count":1,"title":["Mercury: Recovering Forgotten Passwords Using Personal Devices"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Mannan","sequence":"first","affiliation":[]},{"given":"David","family":"Barrera","sequence":"additional","affiliation":[]},{"given":"Carson D.","family":"Brown","sequence":"additional","affiliation":[]},{"given":"David","family":"Lie","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad, D.: The confused deputy and the domain hijacker. IEEE Security an Privacy\u00a06(1) (2008)","DOI":"10.1109\/MSP.2008.25"},{"key":"26_CR2","unstructured":"Android Open Source Project. Data storage (android developers), http:\/\/developer.android.com\/guide\/topics\/data\/data-storage.html"},{"key":"26_CR3","unstructured":"BBCNews.com. Obama Twitter account hacked by Frenchman(March 24, 2010), http:\/\/news.bbc.co.uk\/2\/hi\/8586269.stm"},{"key":"26_CR4","unstructured":"Bonneau, J., Preibusch, S.: The password thicket: Technical and market failures in human authentication on the web. In: Workshop on the Economics of Information Security (WEIS 2010), Cambridge, MA, USA (June 2010)"},{"key":"26_CR5","unstructured":"Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Secure, consumer-friendly web authentication and payments with a phone. In: Conference on Mobile Computing, Applications, and Services (MobiCASE 2010), Santa Clara, CA, USA (October 2010)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Ellison, C.M., Hall, C., Milbert, R., Schneier, B.: Protecting secret keys with personal entropy. Future Generation Computer Systems\u00a016(4) (February 2000)","DOI":"10.1016\/S0167-739X(99)00055-2"},{"key":"26_CR7","unstructured":"Flor\u00eancio, D., Herley, C., Coskun, B.: Do strong web passwords accomplish anything? In: USENIX Workshop on Hot Topics in Security (HotSec 2007), Boston, MA, USA (August 2007)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.: Email-based identification and authentication: An alternative to PKI? IEEE Security and Privacy\u00a01(6) (2004)","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"26_CR9","unstructured":"Guardian.co.uk. Gmail ups security after Chinese attack. News article (January 13, 2010), http:\/\/www.guardian.co.uk\/technology\/2010\/jan\/13\/gmail-increases-security-chinese-attack"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.: Love and authentication. In: Conference on Human Factors in Computing Systems (CHI 2008), Florence, Italy (April 2008)","DOI":"10.1145\/1357054.1357087"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Jonsson, J., Kaliski, B.: Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1. RFC 3447, Category: Informational (February 2003)","DOI":"10.17487\/rfc3447"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Lopez, J., Oppliger, R., Pernul, G.: Why have public key infrastructures failed so far. Internet Research\u00a015(5) (2005)","DOI":"10.1108\/10662240510629475"},{"key":"26_CR13","unstructured":"Mannan, M., van Oorschot, P.: Digital objects as passwords. In: USENIX Workshop on Hot Topics in Security (HotSec 2008), San Jose, CA, USA (July 2008)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentiction. Security and Networks\u00a04(1\u20132) (2009)","DOI":"10.1504\/IJSN.2009.023425"},{"key":"26_CR15","unstructured":"Mitnick, K., Simon, W.L.: The Art of Deception. Wiley (2002)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Rabkin, A.: Personal knowledge questions for fallback authentication. In: Symposium on Usable Privacy and Security (SOUPS 2008), Pittsburgh, USA (July 2008)","DOI":"10.1145\/1408664.1408667"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Renaud, K., Just, M.: Pictures or questions? Examining user responses to association-based authentication. In: British HCI Conference, Dundee, Scotland (September 2010)","DOI":"10.14236\/ewic\/HCI2010.14"},{"key":"26_CR18","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: USENIX Security Symposium, Baltimore, MD, USA (2005)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Schechter, S., Brush, A.J.B., Egelman, S.: It\u2019s no secret. Measuring the security and reliability of authentication via \u2018secret\u2019 questions. In: IEEE Symposium on Security and Privacy (May 2009)","DOI":"10.1145\/1572532.1572580"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your botnet is my botnet: Analysis of a botnet takeover. In: ACM Computer and Communications Security (CCS 2009), Chicago, IL, USA (November 2009)","DOI":"10.1145\/1653662.1653738"},{"key":"26_CR21","unstructured":"Trusteer.com. Reused login credentials. Security advisory (February 2, 2010), http:\/\/www.trusteer.com\/sites\/default\/files\/cross-logins-advisory.pdf"},{"key":"26_CR22","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: A usability evaluation of PGP 5.0. In: USENIX Security Symposium, Washington, D.C, USA (1999)"},{"key":"26_CR23","unstructured":"Wired.com. Palin e-mail hacker says it was easy (September18, 2008), http:\/\/www.wired.com\/threatlevel\/2008\/09\/palin-e-mail-ha\/"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Monrose, F., Reiter, M.: The security of modern password expiration: An algorithmic framework and empirical analysis. In: ACM Computer and Communications Security (CCS 2010), Chicago, IL, USA (October 2010)","DOI":"10.1145\/1866307.1866328"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Zviran, M., Haga, W.J.: Cognitive passwords: The key to easy access control. Computers & Security\u00a09(8) (1990)","DOI":"10.1016\/0167-4048(90)90115-A"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Zviran, M., Haga, W.J.: A comparison of password techniques for multilevel authentication mechanisms. Computer Journal\u00a036(3) (1993)","DOI":"10.1093\/comjnl\/36.3.227"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27576-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T16:39:11Z","timestamp":1593621551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27576-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275753","9783642275760"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27576-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}