{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T19:57:37Z","timestamp":1721678257218},"reference-count":21,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2004,4,1]],"date-time":"2004-04-01T00:00:00Z","timestamp":1080777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2004,4]]},"DOI":"10.1016\/s0164-1212(03)00004-9","type":"journal-article","created":{"date-parts":[[2003,10,11]],"date-time":"2003-10-11T07:27:44Z","timestamp":1065857264000},"page":"163-175","source":"Crossref","is-referenced-by-count":17,"title":["Hyppocrates: a new proactive password checker"],"prefix":"10.1016","volume":"71","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Paolo","family":"D\u2019Arco","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(03)00004-9_BIB1","unstructured":"Anderson, J., 1980. Computer security threat monitoring and surveillance. Technical Report, Fort Washington, PA."},{"key":"10.1016\/S0164-1212(03)00004-9_BIB2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/290163.290164","article-title":"High dictionary compression for proactive password checking","volume":"1","author":"Bergadano","year":"1998","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB3","doi-asserted-by":"crossref","unstructured":"Bishop, M., 1991. Password management. In: Proceedings of COMPCON 1991, pp. 167\u2013169","DOI":"10.1109\/CMPCON.1991.128801"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB4","unstructured":"Bishop, M., 1992a. Anatomy of a proactive password checker. In: Proceedings of the Third UNIX Security Symposium, pp. 130\u2013139"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB5","unstructured":"Bishop, M., 1992b. Proactive password checking. In: Proceedings of the Fourth Workshop on Computer Security Incident Handling, pp. W11:1\u20139"},{"issue":"3","key":"10.1016\/S0164-1212(03)00004-9_BIB6","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/0167-4048(95)00003-Q","article-title":"Improving system security via proactive password checking","volume":"14","author":"Bishop","year":"1995","journal-title":"Computers and Security"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB7","doi-asserted-by":"crossref","DOI":"10.1145\/362686.362692","article-title":"Space\/time trade-offs in hash coding with allowable errors","author":"Bloom","year":"1970","journal-title":"Communications of ACM"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB8","doi-asserted-by":"crossref","unstructured":"Boyko, V., MacKenzie, P., Patel, S., 1991. Provably secure password-authenticated key exchange using diffie-hellman. In: Proceedings of Eurocrypt 2000. Lecture Notes in Computer Science, vol. 1807, pp. 156\u2013171","DOI":"10.1007\/3-540-45539-6_12"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB9","series-title":"Classification and Regression Trees","author":"Breiman","year":"1984"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB10","unstructured":"Davies, C., Ganesan, R., 1993. Bapasswd: a new proactive password checker. In: Proceedings of the 16th National Conference on Computer Security, pp. 1\u201315"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB11","doi-asserted-by":"crossref","unstructured":"Katz, J., Ostrovsky, R., Yung, M., 2001. Efficient password-authenticated key exchange using human-memorable passwords. In: Proceedings of Eurocrypt 2001. Lecture Notes in Computer Science, vol. 2045, pp. 475\u2013495","DOI":"10.1007\/3-540-44987-6_29"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB12","unstructured":"Klein, D.V., 1990. Foiling the cracker\u2013\u2013a survey of, and improvements to, password security. In: Proceedings of the Second USENIX Workshop on Security, pp. 5\u201314"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB13","unstructured":"Muffett, A.D., 1992. Crack 5.0"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB14","unstructured":"Nagle, J.B., 1988. An obvious password detector"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB15","first-page":"33","article-title":"Kerberos: an authentication service for computer networks","volume":"32","author":"Neuman","year":"1994","journal-title":"IEEE Transactions on Communication"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB16","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","article-title":"Simplifying decision trees","volume":"27","author":"Quinlan","year":"1987","journal-title":"International Journal of Man Machine Studies"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB17","series-title":"C4.5: Program for Machine Learning","author":"Quinlan","year":"1992"},{"issue":"3","key":"10.1016\/S0164-1212(03)00004-9_BIB18","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0890-5401(89)90010-2","article-title":"Inferring decision trees using the minimum description length principle","volume":"80","author":"Quinlan","year":"1989","journal-title":"Information and Computation"},{"issue":"3","key":"10.1016\/S0164-1212(03)00004-9_BIB19","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1214\/aos\/1176350051","article-title":"Stochastic complexity and modeling","volume":"14","author":"Rissanen","year":"1986","journal-title":"The Annals of Statistics"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB20","first-page":"343","article-title":"Opus: preventing weak password choices","volume":"3","author":"Spafford","year":"1992","journal-title":"Computers and Security"},{"key":"10.1016\/S0164-1212(03)00004-9_BIB21","series-title":"Network and Internetwork Security Principles and Practice","author":"Stalling","year":"1995"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121203000049?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121203000049?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T01:10:36Z","timestamp":1585185036000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121203000049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4]]},"references-count":21,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2004,4]]}},"alternative-id":["S0164121203000049"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(03)00004-9","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2004,4]]}}}