{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:58:17Z","timestamp":1725695897403},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cts.2015.7210447","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:46:15Z","timestamp":1440107175000},"page":"345-350","source":"Crossref","is-referenced-by-count":2,"title":["Seed-based authentication"],"prefix":"10.1109","author":[{"given":"Nader","family":"Nassar","sequence":"first","affiliation":[]},{"given":"Li-Chiou","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Labeled Faces in the Wild: Updates and New Reporting Procedures","author":"huang","year":"2014","journal-title":"Amherst Technical Report"},{"article-title":"BIG CPU, BIG DATA: Solving the World's Toughest Computational Problems with Parallel Computing","year":"2013","author":"alan","key":"ref11"},{"journal-title":"Parallel Java 2 Library","year":"2014","author":"alan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IMSAA.2009.5439461"},{"key":"ref14","first-page":"17","article-title":"Stronger Password Authentication Using Browser Extension","author":"blake","year":"2005","journal-title":"Proceedings of the 14th USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288119"},{"key":"ref16","article-title":"A practical, targeted, and stealthy attack against WPA enterprise authentication","author":"cassola","year":"2013","journal-title":"NDSS"},{"journal-title":"mschapv2acc a proof of concept of MS-CHAPV2 auditing and cracking tool","year":"2012","author":"charles","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6154-8_40"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF02241740"},{"key":"ref4","article-title":"System and method for user authentication employing dynamic encryption variables","author":"audebert","year":"1999","journal-title":"U S Patent"},{"key":"ref3","article-title":"Method and system for improved security","author":"crosby","year":"2002","journal-title":"U S Patent Application"},{"key":"ref6","first-page":"583","article-title":"Password interception in a SSL\/TLS channel","author":"brice","year":"2003"},{"key":"ref5","first-page":"1","article-title":"Password strength: An empirical analysis","author":"dell'amico","year":"0","journal-title":"INFOCOM 2010 Proceedings IEEE"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.151"},{"key":"ref7","first-page":"1","article-title":"Parallel random numbers: as easy as 1, 2, 3","author":"salmon","year":"0","journal-title":"High Performance Computing Networking Storage and Analysis (SC) 2011 International Conference for 2011"},{"key":"ref2","article-title":"Studying password use in the wild: practical problems and possible solutions","author":"inglesant","year":"2010","journal-title":"SOUPS 2010 Workshop on Usable Security Experiment Reports"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"ref9","first-page":"352","article-title":"Numerical recipes: The art of scientific computing","author":"press","year":"2007"},{"article-title":"A Survey on Security Considerations for Microcontrollers in Traffic Light Networks","year":"2013","author":"johan","key":"ref20"}],"event":{"name":"2015 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2015,6,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7169724\/7210375\/07210447.pdf?arnumber=7210447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:37:13Z","timestamp":1490391433000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7210447\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cts.2015.7210447","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}