{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:03:19Z","timestamp":1771869799433,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642346378","type":"print"},{"value":"9783642346385","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34638-5_1","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T11:14:46Z","timestamp":1350472486000},"page":"1-12","source":"Crossref","is-referenced-by-count":33,"title":["Linguistic Properties of Multi-word Passphrases"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Bonneau","sequence":"first","affiliation":[]},{"given":"Ekaterina","family":"Shutova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Andersen, \u00d8., Nioche, J., Briscoe, E.J., Carroll, J.: The BNC Parsed with RASP4UIMA. In: Proceedings of LREC 2008 (2008)"},{"key":"1_CR2","unstructured":"Bard, G.V.: Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric. In: ACSW 2007: Proceedings of the 5th Australasian Symposium on ACSW Frontiers, vol.\u00a068, pp. 117\u2013124. Australian Computer Society, Inc., Darlinghurst (2007)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-14577-3_10","volume-title":"Financial Cryptography and Data Security","author":"J. Bonneau","year":"2010","unstructured":"Bonneau, J., Just, M., Matthews, G.: What\u2019s in a Name? Evaluating Statistical Attacks against Personal Knowledge Questions. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 98\u2013113. Springer, Heidelberg (2010)"},{"key":"1_CR4","unstructured":"Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS 2010: Proceedings of the 9th Workshop on the Economics of Information Security (2010)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-3-642-32946-3_3","volume-title":"FC 2012","author":"J. Bonneau","year":"2012","unstructured":"Bonneau, J., Preibusch, S., Anderson, R.: A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 25\u201340. Springer, Heidelberg (2012)"},{"key":"1_CR6","unstructured":"Brantz, T., Franz, A.: The Google Web 1T 5-gram corpus. Technical Report LDC2006T13, Linguistic Data Consortium (2006)"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3115\/1225403.1225423","volume-title":"COLING-ACL 2006: Proceedings of the COLING\/ACL on Interactive Presentation Sessions","author":"T. Briscoe","year":"2006","unstructured":"Briscoe, T., Carroll, J., Watson, R.: The second release of the RASP system. In: COLING-ACL 2006: Proceedings of the COLING\/ACL on Interactive Presentation Sessions, pp. 77\u201380. Association for Computational Linguistics, Stroudsburg (2006)"},{"key":"1_CR8","first-page":"22","volume":"16","author":"K.W. Church","year":"1990","unstructured":"Church, K.W., Hanks, P.: Word association norms, mutual information, and lexicography. Computational Linguistics\u00a016, 22\u201329 (1990)","journal-title":"Computational Linguistics"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-03549-4_14","volume-title":"Financial Cryptography and Data Security","author":"C. Herley","year":"2009","unstructured":"Herley, C., van Oorschot, P.C., Patrick, A.S.: Passwords: If We\u2019re So Smart, Why Are We Still Using Them? In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 230\u2013237. Springer, Heidelberg (2009)"},{"key":"1_CR10","unstructured":"Jakobsson, M., Akavipat, R.: Rethinking Passwords to Adapt to Constrained Keyboards (2011), www.fastword.me"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ijhcs.2006.08.005","volume":"65","author":"M. Keith","year":"2007","unstructured":"Keith, M., Shao, B., Steinbart, P.J.: The usability of passphrases for authentication: An empirical field study. International Journal of Human-Computer Studies\u00a065(1), 17\u201328 (2007)","journal-title":"International Journal of Human-Computer Studies"},{"key":"1_CR12","unstructured":"Kelley, P.G., Mazurek, M.L., Shay, R., Bauer, L., Christin, N., Cranor, L.F., Komanduri, S., Egelman, S.: Of Passwords and People: Measuring the Effect of Password-Composition Policies. In: CHI 2011: Proceedings of the 29th ACM SIGCHI Conference on Human Factors in Computing Systems (2011)"},{"key":"1_CR13","unstructured":"Klein, D.: Foiling the Cracker: A Survey of, and Improvements to, Password Security. In: Proceedings of the 2nd USENIX Security Workshop, pp. 5\u201314 (1990)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Kuo, C., Romanosky, S., Cranor, L.F.: Human Selection of Mnemonic Phrase-based Passwords. In: SOUPS 2006: Proceedings of the 2nd Symposium on Usable Privacy and Security, pp. 67\u201378. ACM (2006)","DOI":"10.1145\/1143120.1143129"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Leech, G.: 100 million words of English: the British National Corpus. Language Research (1993)","DOI":"10.1017\/S0266078400006854"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11880561_16","volume-title":"String Processing and Information Retrieval","author":"A. Mehler","year":"2006","unstructured":"Mehler, A., Skiena, S.: Improving Usability Through Password-Corrective Hashing. In: Crestani, F., Ferragina, P., Sanderson, M. (eds.) SPIRE 2006. LNCS, vol.\u00a04209, pp. 193\u2013204. Springer, Heidelberg (2006)"},{"issue":"11","key":"1_CR17","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password Security: A Case History. Communications of the ACM\u00a022(11), 594\u2013597 (1979)","journal-title":"Communications of the ACM"},{"key":"1_CR18","unstructured":"Perrig, A., Song, D.: Hash Visualization: a New Technique to Improve Real-World Security. In: International Workshop on Cryptographic Techniques and E-Commerce, pp. 131\u2013138 (1999)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/3-540-44495-5_7","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"J.O. Pliam","year":"2000","unstructured":"Pliam, J.O.: On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 67\u201379. Springer, Heidelberg (2000)"},{"key":"1_CR20","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"C.E. Shannon","year":"1951","unstructured":"Shannon, C.E.: Prediction and entropy of printed English. Bell System Technical Journal\u00a030, 50\u201364 (1951)","journal-title":"Bell System Technical Journal"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-540-89641-8_24","volume-title":"Cryptology and Network Security","author":"K. Shimizu","year":"2008","unstructured":"Shimizu, K., Suzuki, D., Tsurumaru, T.: High-Speed Search System for PGP Passphrases. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 332\u2013348. Springer, Heidelberg (2008)"},{"issue":"5","key":"1_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password Memorability and Security: Empirical Results. IEEE Security & Privacy Magazine\u00a02(5), 25\u201334 (2004)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"1_CR23","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press (1995)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34638-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:13:53Z","timestamp":1606169633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34638-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346378","9783642346385"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34638-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}