{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:49:43Z","timestamp":1726058983072},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811508707"},{"type":"electronic","value":"9789811508714"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0871-4_17","type":"book-chapter","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T19:14:18Z","timestamp":1573758858000},"page":"219-231","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Password Strength Estimators Trained on the Leaked Password Lists"],"prefix":"10.1007","author":[{"given":"Cameron R.","family":"Schafer","sequence":"first","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: 2009 IEEE\/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 641\u2013644. IEEE (2009)","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"17_CR2","unstructured":"Burr, W., et al.: Nist special publication 800\u201363-2: Electronic authentication guideline. Technical report, National Institute of Standards and Technology (2013)"},{"key":"17_CR3","unstructured":"Password guessability service. \n                    https:\/\/pgs.ece.cmu.edu\/\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR4","unstructured":"Dropbox landing. \n                    https:\/\/www.dropbox.com\/login\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th international Conference on World Wide Web, pp. 657\u2013666. ACM (2007)","DOI":"10.1145\/1242572.1242661"},{"issue":"6","key":"17_CR6","first-page":"159","volume":"7","author":"D Flor\u00eancio","year":"2007","unstructured":"Flor\u00eancio, D., Herley, C., Coskun, B.: Do strong web passwords accomplish anything? HotSec 7(6), 159 (2007)","journal-title":"HotSec"},{"key":"17_CR7","unstructured":"Google: Google landing. \n                    https:\/\/accounts.google.com\/signup\/v2\/webcreateaccount?continue=accounts.google.com\/ManageAccount&gmb=exp&biz=false&flowName=GlifWebSignIn&flowEntry=SignUp\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR8","unstructured":"Grassi, P.A., et al.: NIST specification 800-63B. In: Digital Identity Guidelines (2017). Accessed 06 July 2019"},{"key":"17_CR9","unstructured":"Hashcat. \n                    https:\/\/hashcat.net\/hashcat\/\n                    \n                  . Accessed 06 July 2019"},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2011.150","volume":"10","author":"C Herley","year":"2012","unstructured":"Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28\u201336 (2012)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1016\/j.jnca.2011.02.004","volume":"34","author":"CY Huang","year":"2011","unstructured":"Huang, C.Y., Ma, S.P., Chen, K.T.: Using one-time passwords to prevent password phishing attacks. J. Netw. Comput. Appl. 34(4), 1292\u20131301 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR12","unstructured":"John the ripper (JtR). \n                    http:\/\/www.openwall.com\/john\/\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR13","unstructured":"Two factor auth (2FA). \n                    https:\/\/twofactorauth.org\/\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Li, Z., He, W., Akhawe, D., Song, D.: The emperor\u2019s new password manager: security analysis of web-based password managers. In: USENIX Security Symposium, pp. 465\u2013479 (2014)","DOI":"10.21236\/ADA614474"},{"key":"17_CR15","unstructured":"WPA2 krack. \n                    https:\/\/www.krackattacks.com\/\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR16","unstructured":"Melicher, W., et al.: Fast, lean, and accurate: modeling password guessability using neural networks. In: USENIX Security Symposium, pp. 175\u2013191 (2016)"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1080\/1206212X.2017.1398214","volume":"40","author":"H Radhappa","year":"2018","unstructured":"Radhappa, H., Pan, L., Zheng, J.X., Wen, S.: Practical overview of security issues in wireless sensor network applications. Int. J. Comput. Appl. 40(4), 202\u2013213 (2018). \n                    https:\/\/doi.org\/10.1080\/1206212X.2017.1398214","journal-title":"Int. J. Comput. Appl."},{"key":"17_CR18","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: USENIX Security Symposium, pp. 17\u201332, Baltimore, MD, USA (2005)"},{"issue":"1","key":"17_CR19","first-page":"15","volume":"9","author":"AD Rubin","year":"1996","unstructured":"Rubin, A.D.: Independent one-time passwords. Comput. Syst. 9(1), 15\u201327 (1996)","journal-title":"Comput. Syst."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Schaub, F., Deyhle, R., Weber, M.: Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, p. 13. ACM (2012)","DOI":"10.1145\/2406367.2406384"},{"key":"17_CR21","unstructured":"Rockyou leak. \n                    https:\/\/wiki.skullsecurity.org\/Passwords\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR22","unstructured":"Ur, B., et al.: Measuring real-world accuracies and biases in modeling password guessability. In: USENIX Security Symposium, pp. 463\u2013481 (2015)"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 162\u2013175. ACM (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., De Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 391\u2013405. IEEE (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"17_CR25","unstructured":"Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: USENIX Security Symposium, pp. 157\u2013173 (2016)"},{"key":"17_CR26","unstructured":"XKCD comic - password memorability. \n                    https:\/\/xkcd.com\/936\/\n                    \n                  . Accessed 06 July 2019"},{"key":"17_CR27","unstructured":"zxcvbn github: Low-budget password strength estimation. \n                    https:\/\/github.com\/dropbox\/zxcvbn\n                    \n                  . Accessed 06 July 2019"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0871-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T19:22:30Z","timestamp":1573759350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0871-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811508707","9789811508714"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0871-4_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tamil Nadul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sastra.edu\/atis2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}