{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:14Z","timestamp":1761621194683,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/prisms.2014.6970600","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T17:20:33Z","timestamp":1418059233000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Do you think your passwords are secure?"],"prefix":"10.1109","author":[{"given":"Dominik","family":"Ziegler","sequence":"first","affiliation":[]},{"given":"Mattias","family":"Rauter","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Stromberger","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Teufl","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Sp 800&#x2013;132. recommendation for password-based key derivation: Part 1: Storage applications","author":"turan","year":"2010","journal-title":"Gaithersburg MD United States Tech Rep"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420964"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"key":"ref12","article-title":"Password Security, Protection, and Management","author":"huth","year":"2012","journal-title":"Carnegie Mellon University Produced for US-CERT a government organization"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350055"},{"key":"ref14","article-title":"RFC 2898: PKCS #5: Password-Based Cryptography Specification (Version 2.0)","author":"kaliski","year":"2000","journal-title":"RSA Laboratories Technical Report"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435397"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.156"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"article-title":"PasswordResearch.com","year":"2013","author":"marshall","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1948049"},{"article-title":"Using Cryptography to Store Credentials Safely","year":"2013","author":"johns","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/586131.586133"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"ref5","first-page":"14","article-title":"Rethinking Password Policies","volume":"38","author":"singer","year":"2013","journal-title":"USENIX"},{"journal-title":"RTT Staff Writer","article-title":"Survey Shows 18% Of U.S. Users Store Secret Passwords On Their Smartphone","year":"2013","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5564479"},{"article-title":"RFC 2104: HMAC: Keyed-Hashing for Message Authentication","year":"1997","author":"krawczyk","key":"ref22"},{"key":"ref21","first-page":"49","article-title":"Pico: no more passwords!","author":"stajano","year":"2011","journal-title":"SP'11 Proceedings of the 19th international conference on Security Protocols Springer-Verlag Berlin Heidelberg"},{"key":"ref24","article-title":"Stronger key derivation via sequential memory-hard functions","author":"percival","year":"2009","journal-title":"Tech Rep"},{"key":"ref23","article-title":"Sp 800&#x2013;132. recommendation for password-based key derivation: Part 1: Storage applications","author":"turan","year":"2010","journal-title":"Gaithersburg MD United States Tech Rep"},{"year":"2013","key":"ref26","article-title":"The Legion of the Bouncy Castle"},{"year":"2012","key":"ref25","article-title":"The scrypt Password-Based Key Derivation Function"}],"event":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","start":{"date-parts":[[2014,5,11]]},"location":"Aalborg, Denmark","end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6963210\/6970591\/06970600.pdf?arnumber=6970600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:48:05Z","timestamp":1490320085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6970600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/prisms.2014.6970600","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}