{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T06:10:09Z","timestamp":1747203009078,"version":"3.40.5"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,17]]},"DOI":"10.1109\/icnc64010.2025.10993740","type":"proceedings-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:44:51Z","timestamp":1747158291000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Memorable Password Generation Algorithm (DyMP-Gen)"],"prefix":"10.1109","author":[{"given":"Baker","family":"Al Smadi","sequence":"first","affiliation":[{"name":"Grambling State University,Computer Science and Digital Technologies,Grambling,LA,USA"}]},{"given":"Dileon","family":"Saint-Jean","sequence":"additional","affiliation":[{"name":"American Public University System Computer Science and Digital Tech Grambling State University,Computer Science and Data Science,Grambling,LA,USA"}]},{"given":"Majd","family":"Tahat","sequence":"additional","affiliation":[{"name":"Louisiana Tech University,Cyberspace Engineering,Ruston,LA,USA"}]},{"given":"Hosam","family":"Alamleh","sequence":"additional","affiliation":[{"name":"University of North Carolina Wilmington,Computer Science,Wilmington,North Carolina"}]},{"given":"Syed","family":"Raza","sequence":"additional","affiliation":[{"name":"American Public University System,Computer Science and Data Science,Charles Town,West Virginia"}]},{"given":"Ali Abdullah S.","family":"AlQahtani","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Computer Systems Technology,Greensboro,North Carolina"}]}],"member":"263","reference":[{"year":"2023","article-title":"Global Password Security Report","key":"ref1"},{"year":"2023","article-title":"2023 Data Breach Report","key":"ref2"},{"year":"2021","article-title":"Online Security Survey","key":"ref3"},{"year":"2022","article-title":"Psychology of Passwords","key":"ref4"},{"year":"2023","article-title":"Password Habits Survey","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SP.2012.44"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1242572.1242661"},{"key":"ref8","first-page":"757","article-title":"Fork me once...: Examining the security implications of social coding in GitHub","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Wang"},{"year":"2021","article-title":"Global Password Security Report","key":"ref9"},{"year":"2020","article-title":"Password Security Survey","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1093\/cybsec\/tyw001"},{"key":"ref12","first-page":"317","article-title":"Why Johnny can\u2019t encrypt: A usability evaluation of PGP 5.0","volume-title":"19th USENIX Security Symposium (USENIX Security 10)","author":"Das"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/322796.322806"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2508859.2516726"},{"key":"ref15","article-title":"Yahoo Says Hackers Stole Data on 500 Million Users in 2014","author":"Perlroth","year":"2016","journal-title":"The New York Times"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SP.2012.38"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MSP.2011.150"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1866307.1866327"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-15497-3_18"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/1978942.1979321"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.4108\/eai.11-2-2022.173452"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ACCESS.2022.3179701"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICSIP52628.2021.9688585"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/CSCWD57460.2023.10152712"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CSCWD54268.2022.9776045"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICSCC.2019.8843591"},{"key":"ref27","first-page":"416","article-title":"Strong Password Generation Based On User Inputs","volume-title":"2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","author":"Tremblay-Savard"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ADICS58448.2024.10533548"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/uemcon53757.2021.9666549"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/icnc59896.2024.10556040"}],"event":{"name":"2025 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2025,2,17]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,2,20]]}},"container-title":["2025 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10993495\/10993515\/10993740.pdf?arnumber=10993740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:35:54Z","timestamp":1747200954000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10993740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icnc64010.2025.10993740","relation":{},"subject":[],"published":{"date-parts":[[2025,2,17]]}}}