{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:32:47Z","timestamp":1777372367923,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811068973","type":"print"},{"value":"9789811068980","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6898-0_13","type":"book-chapter","created":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T03:35:04Z","timestamp":1510198504000},"page":"159-169","source":"Crossref","is-referenced-by-count":4,"title":["Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials"],"prefix":"10.1007","author":[{"given":"T.","family":"Nathezhtha","sequence":"first","affiliation":[]},{"given":"V.","family":"Vaidehi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,10]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/TDSC.2015.2406707","volume":"13","author":"I Erguler","year":"2016","unstructured":"Erguler, I.: Achieving flateness: selecting the honeywords from existing users passwords. IEEE Trans. Dependable Secure Comput. 13, 284\u2013295 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"13_CR2","unstructured":"Cloud Security Alliance: The Treacherous 12- Cloud Computing Top Threats in 2016, February 2016"},{"key":"13_CR3","unstructured":"Vance, A.: If your password is 123456, just make it hackme. New York Times, January 2010"},{"key":"13_CR4","unstructured":"Brown, K.: The dangers of weak hashes. SANS Institute InfoSec Reading Room, Maryland, US, pp. 1\u201322, November 2013"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Rivest, R.L.: Honeywords: making password-cracking detectable. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 145\u2013160 (2013)","DOI":"10.1145\/2508859.2516671"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Bojinov, H., Bursztein, E., Boyen, X., Boneh, D.: Kamouflage: loss-resistant password management. In: Proceedings of the 15th European Symposium on Research in Computer Security, pp. 286\u2013302 (2010)","DOI":"10.1007\/978-3-642-15497-3_18"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6898-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T03:40:45Z","timestamp":1510198845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6898-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811068973","9789811068980"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6898-0_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}