{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T01:48:36Z","timestamp":1774057716413,"version":"3.50.1"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/msec.2020.2970639","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T21:34:22Z","timestamp":1583357662000},"page":"38-47","source":"Crossref","is-referenced-by-count":6,"title":["StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6435-564X","authenticated-orcid":false,"given":"Yuan","family":"Tian","sequence":"first","affiliation":[{"name":"Computer Science, University of Virginia, Charlottesville, Virginia United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8436-5776","authenticated-orcid":false,"given":"Cormac","family":"Herley","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, Washington United States"}]},{"given":"Stuart","family":"Schechter","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, California United States"}]}],"member":"263","reference":[{"key":"ref10","year":"2014","journal-title":"Consumer Password Worst Practices"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00003-X"},{"key":"ref12","first-page":"81","article-title":"A future-adaptable password scheme","author":"provos","year":"0","journal-title":"Proc USENIX Annu Technical Conf Freenix Track"},{"key":"ref13","article-title":"Stronger key derivation via sequential memory-hard functions","author":"percival","year":"0","journal-title":"Proc BSDCan"},{"key":"ref14","first-page":"1","article-title":"Do strong web passwords accomplish anything?","author":"flor\u00eancio","year":"0","journal-title":"Proc 2nd USENIX Workshop on Hot Topics In Security"},{"key":"ref15","article-title":"&#x2018;Ten strikes and you&#x2019;re out&#x2019;: Increasing the number of login attempts can improve password usability","author":"brostoff","year":"0","journal-title":"Proc CHiME Workshop"},{"key":"ref16","first-page":"1","article-title":"The password thicket: Technical and market failures in human authentication on the web","author":"bonneau","year":"0","journal-title":"Proc of Workshop on the Economics of Information Security (WEIS)"},{"key":"ref4","year":"0","journal-title":"Stopguessing"},{"key":"ref3","article-title":"Apple confirms celebrities&#x2019; accounts breached","author":"gallagher","year":"2014","journal-title":"ARS Technica"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2970639"},{"key":"ref8","author":"schechter","year":"2017","journal-title":"The binomial ladder frequency filter and its applications to shared secrets"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref2","article-title":"Weak password brings &#x2018;happiness&#x2019; to Twitter hacker","author":"zetter","year":"2009","journal-title":"Wired"},{"key":"ref1","year":"2013","journal-title":"Weak passwords brute forced"},{"key":"ref9","year":"2020","journal-title":"Anonymized"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9091349\/09024242.pdf?arnumber=9024242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:44:01Z","timestamp":1651779841000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9024242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":16,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/msec.2020.2970639","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}