{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T12:57:52Z","timestamp":1758632272203,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890939","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:43:34Z","timestamp":1410363814000},"page":"189-198","source":"Crossref","is-referenced-by-count":6,"title":["Improving usability of passphrase authentication"],"prefix":"10.1109","author":[{"given":"Glen","family":"Nielsen","sequence":"first","affiliation":[]},{"given":"Michael","family":"Vedel","sequence":"additional","affiliation":[]},{"given":"Christian D.","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/363958.363994"},{"key":"18","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics-Doklady"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/1143120.1143129"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-57p1r3","author":"barker","year":"2012","journal-title":"Nist Cryptographic Standards Programrecommendation for Key Management-part 1 General (Revision 3)"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1002\/j.1538-7305.1951.tb01366.x"},{"year":"1988","author":"norman","journal-title":"The Design of Everyday Things 2002","key":"14"},{"year":"2009","author":"reinhold","journal-title":"Pgp Passphrase Usage","key":"11"},{"year":"2009","journal-title":"Secure Password Generator","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/MC.1998.707612"},{"year":"2009","author":"gutenberg","journal-title":"The Online Book Catalog","key":"20"},{"key":"22","first-page":"76","article-title":"Concept for a smartcard kerberos","year":"1992","journal-title":"National Computer Security Conference Proceedings"},{"key":"23","article-title":"Proactive password checking","author":"bishop","year":"1992","journal-title":"Proceedings of the Fourth Workshop on Computer Security Incident Handling"},{"key":"24","first-page":"1","article-title":"Password policy: The good, the bad and the ugly","volume":"58","author":"summers","year":"2004","journal-title":"ACM International Conference Proceeding Series Proceedings of the Winter International Synposium on Information and Communication Technologies"},{"year":"2005","author":"gaw","journal-title":"Reuse and Recycle Online Password Management","key":"25"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1016\/j.ijhcs.2006.08.005"},{"year":"2009","journal-title":"Information Technology-trusted Platform Module-part 1 Overview","key":"27"},{"key":"3","first-page":"5","article-title":"Foiling the Cracker-A survey of, and improvements to, password security","author":"klein","year":"1990","journal-title":"Proc Second USENIX Workshop Security"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1143120.1143127"},{"year":"2009","author":"university","journal-title":"Passphrase Definition","key":"10"},{"key":"1","first-page":"169","author":"schneier","year":"1996","journal-title":"Applied Cryptography"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1037\/h0043158"},{"key":"6","first-page":"44","article-title":"UNIX password security-ten years later","author":"feldmeier","year":"1989","journal-title":"Proceedings of CRYPTO'89"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/322796.322806"},{"year":"2000","author":"yan","journal-title":"The Memorability and Security of Passwords-some Empirical Results","key":"4"},{"year":"2009","author":"stamps","journal-title":"Computer Passwords Are Passe","key":"9"},{"year":"2004","author":"allan","journal-title":"Passwords Are Near the Breaking Point","key":"8"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890939.pdf?arnumber=6890939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:12:49Z","timestamp":1498162369000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890939","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}