{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:25:06Z","timestamp":1747196706275,"version":"3.40.5"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662455258"},{"type":"electronic","value":"9783662455265"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45526-5_25","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T11:07:08Z","timestamp":1417432028000},"page":"264-276","source":"Crossref","is-referenced-by-count":0,"title":["How to Set and Manage Your Network Password: A Multidimensional Scheme of Password Reuse"],"prefix":"10.1007","author":[{"given":"Yang","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"25_CR1","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1016\/j.sigpro.2003.08.001","volume":"83","author":"L.G. Rodrigo de","year":"2003","unstructured":"de Rodrigo, L.G., Carlos, A.L., Atman, A., et al.: Biometric identification systems. Signal Processing\u00a083(12), 2539\u20132557 (2003)","journal-title":"Signal Processing"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely man-aging passwords. In: Proceedings of the 14th International Conference on World Wide Web, pp. 471\u2013479. ACM (2005)","DOI":"10.1145\/1060745.1060815"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Shirley, G., Edword, W.F.: Password management strategies for online ac-counts. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 44\u201355. ACM (2006)","DOI":"10.1145\/1143120.1143127"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 161\u2013170. ACM (2002)","DOI":"10.1145\/586110.586133"},{"key":"25_CR5","unstructured":"China Internet Network Information Center (CNNIC). The 28th Statistical Report on Internet Development in China [EB\/OL], (July 19, 2011), http:\/\/www.cnnic.net.cn"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1057\/ejis.2009.9","volume":"18","author":"J. Zhang","year":"2009","unstructured":"Zhang, J., Luo, X., Akkaladevi, S., et al.: Improving multiple-password recall: an empirical study. European Journal of Information Systems\u00a018(2), 165\u2013176 (2009)","journal-title":"European Journal of Information Systems"},{"key":"25_CR7","unstructured":"Notoatmodjo, G., Thomborson, C.: Passwords and perceptions. In: Proceedings of the 7th Australasian Conference on Information Security, vol.\u00a098, pp. 71\u201378. Australian Computer Society, Inc. (2009)"},{"issue":"2","key":"25_CR8","first-page":"174","volume":"8","author":"S.M. Devi","year":"2013","unstructured":"Devi, S.M., Geetha, M.: OPass: Attractive presentation of user authentication protocol with resist to password reuse attacks. International Journal of Computer Science and Mobile Computing\u00a08(2), 174\u2013180 (2013)","journal-title":"International Journal of Computer Science and Mobile Computing"},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B. Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Communications of the ACM\u00a047(4), 75\u201378 (2004)","journal-title":"Communications of the ACM"},{"key":"25_CR10","unstructured":"Schneier.B. Real-world passwords [EB\/OL]. Schneier on Security 12 (2006)"},{"key":"25_CR11","unstructured":"http:\/\/www.schneier.com\/blog\/archives\/2006\/12\/realworld_passw.html"},{"issue":"1","key":"25_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1108\/20408741311303887","volume":"4","author":"C. Yang","year":"2013","unstructured":"Yang, C., Hung, J.-L., Lin, Z.: An analysis view on password pat-terns of Chi-nese internet users. Nankai Business Review International\u00a04(1), 66\u201377 (2013)","journal-title":"Nankai Business Review International"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM (2007)","DOI":"10.1145\/1242572.1242661"},{"issue":"6","key":"25_CR14","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1002\/acp.1014","volume":"18","author":"A.S. Brown","year":"2004","unstructured":"Brown, A.S., Bracken, E., Zoccoli, S., et al.: Generating and remembering pass-words. Applied Cognitive Psychology\u00a018(6), 641\u2013651 (2004)","journal-title":"Applied Cognitive Psychology"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ijinfomgt.2012.01.001","volume":"32","author":"Y. Bang","year":"2012","unstructured":"Bang, Y., Lee, D.J., Bae, Y.S., et al.: Improving information security management: An analysis of ID\u2013password usage and a new login vulnerability measure. International Journal of Information Management\u00a032(5), 409\u2013418 (2012)","journal-title":"International Journal of Information Management"},{"issue":"19","key":"25_CR16","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"3","author":"M.A. Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the \u2019weakest link\u2019 \u2014 a human\/computer interaction approach to usable and effective security. BT Technology Journal\u00a03(19), 122\u2013131 (2001)","journal-title":"BT Technology Journal"},{"issue":"5203","key":"25_CR17","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1126\/science.7878473","volume":"267","author":"J.E. Lisman","year":"1995","unstructured":"Lisman, J.E., Idiart, M.A.: Storage of 7+\/-2 short-term memories in oscillatory subcycles. Science\u00a0267(5203), 1512\u20131515 (1995)","journal-title":"Science"}],"container-title":["IFIP Advances in Information and Communication Technology","Digital Services and Information Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45526-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T21:55:39Z","timestamp":1747173339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45526-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662455258","9783662455265"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45526-5_25","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}