{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:59:14Z","timestamp":1769637554708,"version":"3.49.0"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/EU.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tifs.2016.2636092","type":"journal-article","created":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T14:09:34Z","timestamp":1481119774000},"page":"2829-2844","source":"Crossref","is-referenced-by-count":32,"title":["A New Multimodal Approach for Password Strength Estimation\u2014Part I: Theory and Algorithms"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2009-0256","authenticated-orcid":false,"given":"Javier","family":"Galbally","sequence":"first","affiliation":[]},{"given":"Iwen","family":"Coisel","sequence":"additional","affiliation":[]},{"given":"Ignacio","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"ref72","first-page":"381","article-title":"Interpolated estimation of Markov source parameters from sparse data","author":"jelinek","year":"1980","journal-title":"Proc Workshop Pattern Recog Pract"},{"key":"ref71","first-page":"182","article-title":"Note on the general case of the Bayes-Laplace formula for inductive or a posteriori probabilities","volume":"8","author":"lidstone","year":"1920","journal-title":"Trans Faculty Actuaries"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.2307\/3212863"},{"key":"ref76","author":"hampel","year":"1986","journal-title":"Robust Statistics The Approach Based on Influence Functions"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818018"},{"key":"ref74","first-page":"92","author":"ross","year":"2006","journal-title":"Handbook of Multibiometrics"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.012"},{"key":"ref38","year":"2009","journal-title":"Passwords"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23268"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165125"},{"key":"ref33","year":"2010","journal-title":"If Your Password is &#x2018;123456&#x2019; Just Make it &#x2018;HackMe&#x2019;"},{"key":"ref32","year":"2009","journal-title":"Weak Password Brings &#x201C;Happiness&#x201D; to Twitter Hacker"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"ref30","first-page":"463","article-title":"Measuring real-world accuracies and biases in modeling password guessability","author":"ur","year":"2015","journal-title":"Proc Usenix Secur Symp"},{"key":"ref37","year":"2016","journal-title":"Announcing Our Worst Passwords of 2015"},{"key":"ref36","year":"2009","journal-title":"The rockyou 32 million password list top 100"},{"key":"ref35","year":"2009","journal-title":"370 Passwords You Shouldn&#x2019;t (and Can&#x2019;t) Use on Twitter"},{"key":"ref34","year":"2008","journal-title":"The Top 500 Worst Passwords of All Time"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986985"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1006\/csla.2001.0174"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"ref28","article-title":"Cracking 400,000 passwords or how to explain to your roommate why the power-bill is a little high","author":"weir","year":"2009","journal-title":"Proc DEFCON Conf"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420966"},{"key":"ref27","year":"2017","journal-title":"John-the-Ripper Open Source Password Cracker"},{"key":"ref65","author":"ross","year":"2006","journal-title":"Handbook of Multibiometrics"},{"key":"ref66","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Sov Phys -Dokl"},{"key":"ref29","article-title":"Modern password cracking: A hands-on approach to creating an optimised and versatile attack","author":"chrysanthou","year":"2013"},{"key":"ref67","author":"jurafsky","year":"1999","journal-title":"Speech and Language Processing"},{"key":"ref68","first-page":"467","article-title":"Class-based n-Gram models of natural language","volume":"18","author":"brown","year":"1992","journal-title":"Computational Linguistics"},{"key":"ref69","article-title":"An empirical study of smoothing techniques for language modeling","author":"chen","year":"1998"},{"key":"ref2","year":"2016","journal-title":"LinkedIn Revisited&#x2014;Full 2012 Hash Dump Analysis"},{"key":"ref1","author":"news","year":"2016","journal-title":"Millions of Hacked LinkedIn IDs Advertised for Sale"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63529"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"ref21","first-page":"123","article-title":"I added ! at the end to make it secure: Observing password creation in the lab","author":"ur","year":"2015","journal-title":"Proc USENIX Symp Usable Privacy Secur (SOUPS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"ref23","author":"schneier","year":"2005","journal-title":"Write Down Your Passwords"},{"key":"ref26","first-page":"1","article-title":"Introducing the PRINCE attack-mode","author":"steube","year":"2014","journal-title":"Proc Int Conf Passwords"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref50","author":"gosney","year":"2016","journal-title":"8x Nvidia GTX 1080 Hashcat Benchmarks"},{"key":"ref51","article-title":"&#x2018;Ten strikes and you&#x2019;re out&#x2019;: Increasing the number of login attempts can improve password usability","author":"brostoff","year":"2003","journal-title":"Proc CHI Workshop Human-Comput Interact Secur Syst"},{"key":"ref59","year":"2016","journal-title":"NIST SP 800-63-3 Public Preview"},{"key":"ref58","year":"2011","journal-title":"Strengthening Passwords"},{"key":"ref57","year":"2015","journal-title":"Safety and Security Center Password Checker"},{"key":"ref56","year":"2015","journal-title":"The Password Meter"},{"key":"ref55","first-page":"157","article-title":"Zxcvbn: Low-budget password strength estimation","author":"wheeler","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2891411"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557377"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"ref40","first-page":"617","article-title":"Making a faster cryptanalytic time-memory trade-off","author":"oechslin","year":"2003","journal-title":"Proc Int Adv in Cryptol Conf (CRYPTO)"},{"key":"ref12","article-title":"NIST special publication 800-63-2: Electronic authentication guideline","author":"burr","year":"2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35694-0_10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref17","first-page":"1","article-title":"Adaptive password-strength meters from Markov models","author":"castelluccia","year":"2012","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730359"},{"key":"ref19","article-title":"Improved models for password guessing","author":"tansey","year":"2011"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"ref3","year":"2016","journal-title":"Mark Zuckerberg&#x2019;s Password Was &#x2018;Dadada What Hope do The Rest of us Have?"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.09.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00003-Q"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"ref49","author":"norris","year":"1998","journal-title":"Markov Chains"},{"key":"ref9","author":"wheeler","year":"2012","journal-title":"zxcvbn realistic password strength estimation"},{"key":"ref46","year":"2016","journal-title":"Hashcat Advanced Password Recovery"},{"key":"ref45","year":"2016","journal-title":"CrackStation Free Password Hash Cracker"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_10"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"key":"ref41","author":"project","year":"2015","journal-title":"Rainbow"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"ref43","year":"2015","journal-title":"Openwall Wordlists Collection"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8017695\/07776908.pdf?arnumber=7776908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:11Z","timestamp":1641987731000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7776908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":80,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2636092","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}