{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:10Z","timestamp":1750307050196,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,7]],"date-time":"2012-08-07T00:00:00Z","timestamp":1344297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,7]]},"DOI":"10.1145\/2346536.2346558","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"121-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Loose password security in Chinese cyber world left the front door wide open to hackers"],"prefix":"10.1145","author":[{"given":"Cheng","family":"Yang","sequence":"first","affiliation":[{"name":"Southwestern University of Finance &amp; Economics, Chengdu, Sichuan, China"}]},{"given":"Jui-Long","family":"Hung","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, Idaho"}]},{"given":"Zhang-Xi","family":"Lin","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, TX"}]}],"member":"320","published-online":{"date-parts":[[2012,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"March 2002","volume-title":"UK study: Passwords often easy to crack. CNN.com","author":"Brown A.","year":"2002","unstructured":"Brown , A. UK study: Passwords often easy to crack. CNN.com ( March 2002 ); http:\/\/archives.cnn.com\/ 2002 \/TECH\/ptech\/03\/13\/dangerous.passwords\/index.html Brown, A. UK study: Passwords often easy to crack. CNN.com (March 2002); http:\/\/archives.cnn.com\/2002\/TECH\/ptech\/03\/13\/dangerous.passwords\/index.html"},{"key":"e_1_3_2_1_2_1","volume-title":"Perfect password: Selection, protection, authentication","author":"Burnett M","year":"2006","unstructured":"Burnett , M and Kleiman , D . Perfect password: Selection, protection, authentication . MA : Syngress, 2006 . P. 28 Burnett, M and Kleiman, D. Perfect password: Selection, protection, authentication. MA: Syngress, 2006. P. 28"},{"key":"e_1_3_2_1_3_1","volume-title":"Statistics from 10,000 leaked Hotmail passwords","author":"Calin B.","year":"2009","unstructured":"Calin , B. Statistics from 10,000 leaked Hotmail passwords . Acunetix : Web Application Security (Oct , 2009 ); http:\/\/www.acunetix.com\/blog\/news\/statistics-from-10000-leaked-hotmail-passwords\/ Calin, B. Statistics from 10,000 leaked Hotmail passwords. Acunetix: Web Application Security (Oct, 2009); http:\/\/www.acunetix.com\/blog\/news\/statistics-from-10000-leaked-hotmail-passwords\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Recommended practice: Improving Industrial control systems Cybersecurity with defense-in-depth strategies (October","author":"Homeland Security","year":"2009","unstructured":"Homeland Security , Recommended practice: Improving Industrial control systems Cybersecurity with defense-in-depth strategies (October , 2009 ); http:\/\/www.us-cert.gov\/control_systems\/practices\/documents\/Defense_in_Depth_Oct09.pdf Homeland Security, Recommended practice: Improving Industrial control systems Cybersecurity with defense-in-depth strategies (October, 2009); http:\/\/www.us-cert.gov\/control_systems\/practices\/documents\/Defense_in_Depth_Oct09.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"e_1_3_2_1_6_1","unstructured":"Lewand R. E. Relative frequencies of letters in general English plain text. Cryptographical Mathematics; http:\/\/pages.central.edu\/emp\/LintonT\/classes\/spring01\/cryptography\/letterfreq.html  Lewand R. E. Relative frequencies of letters in general English plain text. Cryptographical Mathematics; http:\/\/pages.central.edu\/emp\/LintonT\/classes\/spring01\/cryptography\/letterfreq.html"},{"key":"e_1_3_2_1_7_1","series-title":"April 2003","volume-title":"Office workers give away passwords for a cheap pen: Security? What's that? Security","author":"Leyden J.","year":"2003","unstructured":"Leyden , J. Office workers give away passwords for a cheap pen: Security? What's that? Security ( April 2003 ); http:\/\/www.theregister.co.uk\/ 2003 \/04\/18\/office_workers_give_away_passwords\/ Leyden, J. Office workers give away passwords for a cheap pen: Security? What's that? Security (April 2003); http:\/\/www.theregister.co.uk\/2003\/04\/18\/office_workers_give_away_passwords\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Password statistics. Security (Feb","author":"Mhassanmemon","year":"2011","unstructured":"Mhassanmemon , Password statistics. Security (Feb , 2011 ); http:\/\/computersight.com\/communication-networks\/security\/password-statistics\/ Mhassanmemon, Password statistics. Security (Feb, 2011); http:\/\/computersight.com\/communication-networks\/security\/password-statistics\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTD.2009.206"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"What users know and what they actually do","volume":"8","author":"Riley S.","year":"2006","unstructured":"Riley , S. Password security : What users know and what they actually do . Usability News , 8 , 1 ( Feb. 2006 ); http:\/\/www.surl.org\/usabilitynews\/81\/Passwords.asp Riley, S. Password security: What users know and what they actually do. Usability News, 8, 1 (Feb. 2006); http:\/\/www.surl.org\/usabilitynews\/81\/Passwords.asp","journal-title":"Usability News"},{"key":"e_1_3_2_1_11_1","series-title":"Dec. 2006","volume-title":"Real-world passwords. Schneier on Security","author":"Schneier B.","year":"2006","unstructured":"Schneier B. Real-world passwords. Schneier on Security ( Dec. 2006 ); http:\/\/www.schneier.com\/blog\/archives\/ 2006 \/12\/realworld_passw.html Schneier B. Real-world passwords. Schneier on Security (Dec. 2006); http:\/\/www.schneier.com\/blog\/archives\/2006\/12\/realworld_passw.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"e_1_3_2_1_13_1","volume-title":"Dec. 2011","author":"Yu L.","year":"2011","unstructured":"Yu , L. and Fang , X . 100 million usernames, passwords leaked. Caixin Online , Dec. 2011 ; http:\/\/english.caixin.com\/ 2011 -12-29\/100344138.html Yu, L. and Fang, X. 100 million usernames, passwords leaked. Caixin Online, Dec. 2011; http:\/\/english.caixin.com\/2011-12-29\/100344138.html"},{"key":"e_1_3_2_1_14_1","first-page":"253","article-title":"Design and implementation of password-based identity authentication system","volume":"9","author":"Zhai S.","year":"2010","unstructured":"Zhai , S. and He , T . Design and implementation of password-based identity authentication system . Computer Application and System Modeling , 9 ( Oct , 2010 ), 253 -- 257 .\\ Zhai, S. and He, T. Design and implementation of password-based identity authentication system. Computer Application and System Modeling, 9 (Oct, 2010), 253--257.\\","journal-title":"Computer Application and System Modeling"},{"key":"e_1_3_2_1_15_1","first-page":"146","article-title":"Study of present probability of 26 English letters in Chinese characters spelling yard","volume":"7","author":"Zhang C. S.","year":"2006","unstructured":"Zhang , C. S. and Guan , W. W . Study of present probability of 26 English letters in Chinese characters spelling yard . Computer Engineering and Applications , 7 ( 2006 ), 146 -- 151 . Zhang, C. S. and Guan, W. W. Study of present probability of 26 English letters in Chinese characters spelling yard. Computer Engineering and Applications, 7 (2006), 146--151.","journal-title":"Computer Engineering and Applications"}],"event":{"name":"ICEC '12: Fourteenth International Conference on Electronic Commerce","sponsor":["Singapore Management University Singapore Management University"],"location":"Singapore Singapore","acronym":"ICEC '12"},"container-title":["Proceedings of the 14th Annual International Conference on Electronic Commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2346536.2346558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2346536.2346558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:05Z","timestamp":1750238465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2346536.2346558"}},"subtitle":["an analytic view"],"short-title":[],"issued":{"date-parts":[[2012,8,7]]},"references-count":15,"alternative-id":["10.1145\/2346536.2346558","10.1145\/2346536"],"URL":"https:\/\/doi.org\/10.1145\/2346536.2346558","relation":{},"subject":[],"published":{"date-parts":[[2012,8,7]]},"assertion":[{"value":"2012-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}