{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:11:57Z","timestamp":1730283117641,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/milcom.2016.7795425","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T21:49:56Z","timestamp":1482788996000},"page":"788-793","source":"Crossref","is-referenced-by-count":0,"title":["Memory chunking analysis of numerical password for Chinese websites"],"prefix":"10.1109","author":[{"family":"Rui Xu","sequence":"first","affiliation":[]},{"family":"Xiaojun Chen","sequence":"additional","affiliation":[]},{"family":"Yingbing Wang","sequence":"additional","affiliation":[]},{"family":"Jinqiao Shi","sequence":"additional","affiliation":[]},{"family":"Haitao Mi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379702"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"journal-title":"Password Management Guideline","year":"1985","key":"ref14"},{"key":"ref15","first-page":"1","article-title":"The memorability and security of passwords: some empirical results","author":"yan","year":"2000","journal-title":"Technical Report"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"key":"ref4","first-page":"217","article-title":"Generalizing case frames using a thesaurus and the mdl principle","volume":"24","author":"li","year":"1998","journal-title":"Computational Linguistics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"year":"0","key":"ref6","article-title":"Dictionary attack"},{"journal-title":"Understanding Cryptography A Textbook for Students and Practitioners","year":"2009","author":"paar","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"article-title":"Password cracking wordlist","year":"0","author":"ripper","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref9","first-page":"559","article-title":"A large-scale empirical analysis of chinese web passwords","author":"li","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"year":"0","key":"ref20"},{"journal-title":"SinaWeibo","year":"0","key":"ref22"},{"year":"0","key":"ref21"}],"event":{"name":"2016 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2016,11,1]]},"location":"Baltimore, MD","end":{"date-parts":[[2016,11,3]]}},"container-title":["MILCOM 2016 - 2016 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784513\/7795145\/07795425.pdf?arnumber=7795425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:48:42Z","timestamp":1583509722000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7795425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/milcom.2016.7795425","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}