{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:06:35Z","timestamp":1773669995053,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128855","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"255-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Fortifying password authentication in integrated healthcare delivery systems"],"prefix":"10.1145","author":[{"given":"Yanjiang","family":"Yang","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"241","volume-title":"Digital Multisignatures, Cryptography and Coding","author":"Boyd C.","year":"1989","unstructured":"C. Boyd . Digital Multisignatures, Cryptography and Coding , pp 241 -- 246 , 1989 .]] C. Boyd. Digital Multisignatures, Cryptography and Coding, pp 241--246, 1989.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948142"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/648184.749735"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. USENIX Security","author":"Brainard J.","year":"2003","unstructured":"J. Brainard , A. Juels , B. Kaliski , M. Szydlo . A New Two-Server Approach for Authentication with Short Secret , Proc. USENIX Security , 2003 .]] J. Brainard, A. Juels, B. Kaliski, M. Szydlo. A New Two-Server Approach for Authentication with Short Secret, Proc. USENIX Security, 2003.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884178"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168618"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319719"},{"key":"e_1_3_2_1_8_1","first-page":"131","volume-title":"Proc. Very Large Data Bases (VLDB)","author":"Bouganim L.","year":"2002","unstructured":"L. Bouganim , P. Pucheral . Chip-Secured Data Access: Confidential Data on Untrusted Servers , Proc. Very Large Data Bases (VLDB) , pp. 131 -- 142 , 2002 .]] L. Bouganim, P. Pucheral. Chip-Secured Data Access: Confidential Data on Untrusted Servers, Proc. Very Large Data Bases (VLDB), pp. 131--142, 2002.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_11_1","volume-title":"For the Record: Protecting Electronic Health Information","author":"Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure.","year":"1997","unstructured":"Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure. For the Record: Protecting Electronic Health Information , National Academy Press , Washington, D.C. , 1997 .]] Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure. For the Record: Protecting Electronic Health Information, National Academy Press, Washington, D.C., 1997.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.833110"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427896_9"},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE. 9th International Workshop on Enabling Technologies","author":"Ford W.","year":"2000","unstructured":"W. Ford , B. S. Kaliski Jr . Sever-assisted Generation of a Strong Secret From a Password , IEEE. 9th International Workshop on Enabling Technologies , 2000 .]] W. Ford, B. S. Kaliski Jr. Sever-assisted Generation of a Strong Secret From a Password, IEEE. 9th International Workshop on Enabling Technologies, 2000.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.223865"},{"key":"e_1_3_2_1_16_1","volume-title":"Working Draft, Version 1.3","author":"Goldreich O.","year":"2001","unstructured":"O. Goldreich . Secure Multi-party Computation , Working Draft, Version 1.3 , June 2001 .]] O. Goldreich. Secure Multi-party Computation, Working Draft, Version 1.3, June 2001.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/526950.830448"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322514"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646139.680777"},{"key":"e_1_3_2_1_20_1","first-page":"5","volume-title":"Password Security, 2nd USENIX Security","author":"Klein D. V.","year":"1990","unstructured":"D. V. Klein . Foiling the Cracker - A Survey of, and Improvements to , Password Security, 2nd USENIX Security , pp. 5 -- 14 , 1990 .]] D. V. Klein. Foiling the Cracker - A Survey of, and Improvements to, Password Security, 2nd USENIX Security, pp. 5--14, 1990.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_1"},{"key":"e_1_3_2_1_22_1","first-page":"475","volume-title":"LNCS 2045","author":"Katz J.","year":"2001","unstructured":"J. Katz , R. Ostrovsky , M. Yung . Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, Advances in Cryptology, Eurocrypt'01 , LNCS 2045 , pp. 475 -- 494 , 2001 .]] J. Katz, R. Ostrovsky, M. Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, Advances in Cryptology, Eurocrypt'01, LNCS 2045, pp. 475--494, 2001.]]"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. Security in Communication Networks","author":"Katz J.","unstructured":"J. Katz , R. Ostrovsky , M. Yung . Forward Secrecy in Password-Only Key Exchange Protocols , Proc. Security in Communication Networks , 2002]] J. Katz, R. Ostrovsky, M. Yung. Forward Secrecy in Password-Only Key Exchange Protocols, Proc. Security in Communication Networks, 2002]]"},{"key":"e_1_3_2_1_24_1","first-page":"385","volume":"2442","author":"Mackenzie P.","year":"2002","unstructured":"P. Mackenzie , T. Shrimpton , M. Jakobsson . Threshold Password-Authenticated Key Exchange, Advances in Cryptology , Crypto'02 , LNCS 2442 , pp. 385 -- 400 , 2002 .]] P. Mackenzie, T. Shrimpton, M. Jakobsson. Threshold Password-Authenticated Key Exchange, Advances in Cryptology, Crypto'02, LNCS 2442, pp. 385--400, 2002.]]","journal-title":"LNCS"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_32"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_7"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","location":"Taipei Taiwan","acronym":"Asia CCS06","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":26,"alternative-id":["10.1145\/1128817.1128855","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128855","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}