{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:16:18Z","timestamp":1761059778575,"version":"3.28.0"},"reference-count":74,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859780","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1366-1371","source":"Crossref","is-referenced-by-count":2,"title":["Brute force analysis of PsychoPass-generated Passwords"],"prefix":"10.1109","author":[{"given":"B.","family":"Brumen","sequence":"first","affiliation":[]},{"given":"A.","family":"Cernezel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","first-page":"27","author":"zonenberg","year":"2009","journal-title":"Distributed Hash Cracker A Cross-platform Gpuaccelerated Password Recovery System"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.1998.658762"},{"journal-title":"Password Recovery Software","year":"2012","key":"33"},{"journal-title":"Cheap GPUs Are Rendering Strong Passwords Useless","year":"2011","author":"kingsley-hughes","key":"34"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2471"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1038\/nature08812"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_6"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2002.1011362"},{"key":"42","first-page":"227","article-title":"An algorithm for protecting knowledge discovery data","volume":"14","author":"brumen","year":"2003","journal-title":"Informatica (Lithuan )"},{"key":"41","first-page":"205","article-title":"Data protection for outsourced data mining","volume":"26","author":"brumen","year":"2002","journal-title":"Informatica (Ljubljana)"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2366"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_4"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00003-Q"},{"key":"69","article-title":"Persuasive password security","author":"weirich","year":"2001","journal-title":"Proceedings of Conference CHI'01 Human Factors in Computing Systems"},{"key":"68","article-title":"Write down your password","author":"schneier","year":"0","journal-title":"Schneier on Security 2005"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554849"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.01.002"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.08.006"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.029"},{"key":"26","first-page":"347","article-title":"Comparative study of tripartite identity-based authenticated key agreement protocols","volume":"33","author":"ho?lbl","year":"2009","journal-title":"Informatica (Ljubljana)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1080\/01611190903030912"},{"key":"28","doi-asserted-by":"crossref","first-page":"295","DOI":"10.15388\/Informatica.2005.100","article-title":"The impact of details in the class diagram on software size estimation","volume":"16","author":"z?ivkovi","year":"2005","journal-title":"Informatica (Lithuan )"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15576-5_40"},{"journal-title":"Privacy Rights Clearinghouse Chronology of Data Breaches Security Breaches 2005-Present","year":"2012","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/114669.114686"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"journal-title":"Exploring the Weakest Link A Study of Personal Password Security","year":"2007","author":"notoatmodjo","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.162"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3601-9_1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"journal-title":"Our Password Hashing Has No Clothes","year":"2012","author":"hunt","key":"32"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1014"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2006","author":"stallings","key":"31"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2002.1013839"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137281"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903121386"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1906"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"journal-title":"Graphical Password","year":"1996","author":"blonder","key":"73"},{"key":"74","first-page":"463","volume":"32","author":"pickover","year":"1990","journal-title":"Menu Icon with Hidden Geometrical Password IBM Technical Disclosure Bulletin"},{"key":"59","first-page":"463","article-title":"Graphical passwords: A survey","author":"suo","year":"2005","journal-title":"Proceedings of 21st Annual Computer Security Applications Conference"},{"key":"58","first-page":"11","article-title":"On user choice in graphical password schemes","volume":"13","author":"davis","year":"2004","journal-title":"Proceeding SSYM'04 Proceedings of the 13th Conference on USENIX Security Symposium"},{"journal-title":"Security in Computing","year":"2003","author":"pfleeger","key":"57"},{"journal-title":"The Memorability and Security of Passwords-some Empirical Results","year":"2000","author":"yan","key":"56"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_9"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/36.3.227"},{"key":"17","first-page":"64","article-title":"Guessing attacks on strong-password authentication protocol","volume":"15","author":"lee","year":"2013","journal-title":"International Journal of Network Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00004-1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"},{"key":"13","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/3-540-48252-0_26","article-title":"Performance assessment framework for distributed object architectures","volume":"1691","author":"juric","year":"1999","journal-title":"Advances in Databases and Information Systems Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"crossref","first-page":"173","DOI":"10.2307\/249574","article-title":"Threats to information systems: Today's reality, yesterday's understanding","volume":"16","author":"loch","year":"1992","journal-title":"MIS Quarterly"},{"key":"11","first-page":"88","article-title":"Patterns for enterprise application integration. Frontier in artificial intelligence and applications","volume":"80","author":"juric","year":"2002","journal-title":"Knowledge-Based Software Engineering"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.03.001"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/419592"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"64","doi-asserted-by":"crossref","DOI":"10.21236\/ADA017676","author":"gasser","year":"1975","journal-title":"A Random Word Generator for Pronounceable Passwords"},{"key":"65","article-title":"A new attack on random pronounceable password generators","author":"ganesan","year":"1994","journal-title":"Proceedings of the 17th NIST-NCSC National Computer Security Conference"},{"journal-title":"Improving Password System Effectiveness","year":"2004","author":"brostoff","key":"62"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(94)90064-7"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1109\/JCIT.1990.128279"},{"journal-title":"National Institute of Standards and Technology","article-title":"PUB 112 password usage","year":"1985","key":"61"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.98.2.204"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-005-1105-z"},{"key":"47","article-title":"Bestfit learning curve model for the C4. 5 algorithm","volume":"25","author":"brumen","year":"2014","journal-title":"Informatica (Lithuan )"},{"key":"46","first-page":"37","article-title":"Password exhaustion: Predicting the end of password usefulness","author":"stclair","year":"2006","journal-title":"Information Systems Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.08.006"},{"key":"51","doi-asserted-by":"crossref","first-page":"521","DOI":"10.15388\/Informatica.2012.373","article-title":"Learning process termination criteria","volume":"23","author":"brumen","year":"2012","journal-title":"Informatica (Lithuan )"},{"key":"52","doi-asserted-by":"crossref","first-page":"343","DOI":"10.15388\/Informatica.2007.181","article-title":"Assessment of classification models with small amounts of data","volume":"18","author":"brumen","year":"2007","journal-title":"Informatica (Lithuan )"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"50","article-title":"Early assessment of classification performance","volume":"32","author":"brumen","year":"2004","journal-title":"ACSW Frontiers '04 Proceedings of the Second Workshop on Australasian Information Security Data Mining and Web Intelligence and Software Internationalisation"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859780.pdf?arnumber=6859780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T19:31:33Z","timestamp":1598124693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":74,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859780","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}