{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:04Z","timestamp":1750307824099,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,10]],"date-time":"2007-09-10T00:00:00Z","timestamp":1189382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,10]]},"DOI":"10.1145\/1378063.1378107","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"261-267","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A note on the security of code memo"],"prefix":"10.1145","author":[{"given":"Ruben","family":"Wolf","sequence":"first","affiliation":[{"name":"Fraunhofer-Institute for Secure Information Technology (SIT), Darmstadt, Germany"}]},{"given":"Markus","family":"Schneider","sequence":"additional","affiliation":[{"name":"Fraunhofer-Institute for Secure Information Technology (SIT), Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2007,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"P. Ducklin. Simple advice for more sensible password use. http:\/\/www.sophos.com Apr. 2006.  P. Ducklin. Simple advice for more sensible password use. http:\/\/www.sophos.com Apr. 2006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.110"},{"key":"e_1_3_2_1_3_1","volume-title":"ZDNet UK News","author":"Hayday G.","year":"2002","unstructured":"G. Hayday . IT users in password hell . ZDNet UK News , Dec. 2002 . G. Hayday. IT users in password hell. ZDNet UK News, Dec. 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"ZDNet UK News","author":"Hayday G.","year":"2003","unstructured":"G. Hayday . Counting the costs of forgotten passwords . ZDNet UK News , Jan. 2003 . G. Hayday. Counting the costs of forgotten passwords. ZDNet UK News, Jan. 2003."},{"volume-title":"2004 Annual Password Survey Results","year":"2004","key":"e_1_3_2_1_5_1","unstructured":"SafeNet. 2004 Annual Password Survey Results . SafeNet (Inc .), http:\/\/www.safenet-inc.com, 2004 . SafeNet. 2004 Annual Password Survey Results. SafeNet (Inc.), http:\/\/www.safenet-inc.com, 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"C. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal 1949 28 4","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_7_1","unstructured":"Sophos. Employee password choices put business at risk. http:\/\/www.sophos.com Apr. 2006.  Sophos. Employee password choices put business at risk. http:\/\/www.sophos.com Apr. 2006."},{"key":"e_1_3_2_1_8_1","unstructured":"J. VanAuken. Review: Password Management: Grief Relief. Information Week http:\/\/www.informationweek.com Jan. 2006.  J. VanAuken. Review: Password Management: Grief Relief. Information Week http:\/\/www.informationweek.com Jan. 2006."}],"event":{"name":"MC07: 4th Mobility Conference: International Conference on Mobile Technology, Application & Systems","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","Singapore Polytechnic"],"location":"Singapore","acronym":"MC07"},"container-title":["Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378063.1378107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378063.1378107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:50Z","timestamp":1750255070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378063.1378107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,10]]},"references-count":8,"alternative-id":["10.1145\/1378063.1378107","10.1145\/1378063"],"URL":"https:\/\/doi.org\/10.1145\/1378063.1378107","relation":{},"subject":[],"published":{"date-parts":[[2007,9,10]]},"assertion":[{"value":"2007-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}