{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:54:58Z","timestamp":1753883698915,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,31]],"date-time":"2008-03-31T00:00:00Z","timestamp":1206921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,31]]},"DOI":"10.1145\/1355284.1355288","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T13:06:52Z","timestamp":1223384812000},"page":"16-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards a framework for security analysis of multiple password schemes"],"prefix":"10.1145","author":[{"given":"Kevser","family":"Karaca","sequence":"first","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]},{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2008,3,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","volume-title":"Federal Financial Institutions Examination Council","author":"FFIEC","year":"2005","unstructured":"FFIEC , Federal Financial Institutions Examination Council , 2005 . Authentication in an Internet Banking Environment . retrieved from http:\/\/www.ffiec.gov\/pdf\/authentication_guidance.pdf on 9.11.2007 FFIEC, Federal Financial Institutions Examination Council, 2005. Authentication in an Internet Banking Environment. retrieved from http:\/\/www.ffiec.gov\/pdf\/authentication_guidance.pdf on 9.11.2007"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science, LNCS 3110","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-540-27809-2_6","volume-title":"Call center customer verification by query-directed passwords","author":"Gorman L. O","year":"2004","unstructured":"Gorman , L. O , Bagga A. , Bentley J. 2004. Call center customer verification by query-directed passwords . In Financial Cryptography, A. Juels (ed.), Lecture Notes in Computer Science, LNCS 3110 , Springer-Verlag , Berlin , 2004 , pp. 54 -- 67 . Gorman, L. O, Bagga A., Bentley J. 2004. Call center customer verification by query-directed passwords. In Financial Cryptography, A. Juels (ed.), Lecture Notes in Computer Science, LNCS 3110, Springer-Verlag, Berlin, 2004, pp. 54--67."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE.","volume":"91","author":"Gorman L. O.","year":"2003","unstructured":"Gorman , L. O. , 2003 . Comparing Passwords, Tokens, and Biometrics for User Authentication . In Proceedings of the IEEE. vol. 91 , no. 12, Dec. 2003, pp. 2019--2040. Gorman, L. O., 2003. Comparing Passwords, Tokens, and Biometrics for User Authentication. In Proceedings of the IEEE. vol. 91, no. 12, Dec. 2003, pp. 2019--2040."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.50"},{"key":"e_1_3_2_1_6_1","first-page":"424","volume-title":"The Handbook of Information Security","author":"Rassmussen J. L.","year":"2006","unstructured":"Rassmussen , J. L. 2006. Password Authentication . In The Handbook of Information Security . H. Bidgoli (ed.), pp. 424 -- 438 . Wiley , 2006 . Rassmussen, J. L. 2006. Password Authentication. In The Handbook of Information Security. H. Bidgoli (ed.), pp. 424--438. Wiley, 2006."},{"key":"e_1_3_2_1_7_1","unstructured":"Site Key at Bank of America. 2007. Retrieved from http:\/\/www.bankofamerica.com\/privacy\/sitekey\/ on 21.11.2007  Site Key at Bank of America. 2007. Retrieved from http:\/\/www.bankofamerica.com\/privacy\/sitekey\/ on 21.11.2007"},{"key":"e_1_3_2_1_8_1","unstructured":"Strong Authentication in Banking and Beyond 2007. Retrieved form http:\/\/www.zurich.ibm.com\/pdf\/csc\/SecureInternetBankingAuthentication.pdf on 5.11.2207  Strong Authentication in Banking and Beyond 2007. Retrieved form http:\/\/www.zurich.ibm.com\/pdf\/csc\/SecureInternetBankingAuthentication.pdf on 5.11.2207"}],"event":{"name":"Eurosys '08: Eurosys 2008 Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Glasgow Scotland","acronym":"Eurosys '08"},"container-title":["Proceedings of the 1st European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1355284.1355288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1355284.1355288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:08Z","timestamp":1750253948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1355284.1355288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,31]]},"references-count":8,"alternative-id":["10.1145\/1355284.1355288","10.1145\/1355284"],"URL":"https:\/\/doi.org\/10.1145\/1355284.1355288","relation":{},"subject":[],"published":{"date-parts":[[2008,3,31]]},"assertion":[{"value":"2008-03-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}