{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:04Z","timestamp":1763507704592,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813631","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"158-169","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Monte Carlo Strength Evaluation"],"prefix":"10.1145","author":[{"given":"Matteo","family":"Dell'Amico","sequence":"first","affiliation":[{"name":"Symantec Research Labs, Biot, France"}]},{"given":"Maurizio","family":"Filippone","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"volume-title":"Statistical foundations of machine learning","year":"2009","author":"Bontempi G.","key":"e_1_3_2_1_2_1"},{"volume-title":"February","year":"2015","author":"Burnett M.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63v1.0.2"},{"volume-title":"Adaptive password-strength meters from markov models","year":"2012","author":"Castelluccia C.","key":"e_1_3_2_1_5_1"},{"volume-title":"From very weak to very strong: Analyzing password-strength meters","year":"2014","author":"Carn\u00e9 de Carnavalet X.","key":"e_1_3_2_1_6_1"},{"volume-title":"Password strength: An empirical analysis","year":"2010","author":"Dell'Amico M.","key":"e_1_3_2_1_7_1"},{"volume-title":"OMEN: Faster password guessing using an ordered Markov enumerator","year":"2015","author":"Duermuth M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"volume-title":"LISA. USENIX","year":"2014","author":"Flor\u00eancio D.","key":"e_1_3_2_1_10_1"},{"volume-title":"USENIX Security","year":"2014","author":"Flor\u00eancio D.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2360743.2360824"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483446"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165125"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"volume-title":"USENIX Security","year":"1990","author":"Klein D. V.","key":"e_1_3_2_1_16_1"},{"volume-title":"USENIX Security","year":"2014","author":"Komanduri S.","key":"e_1_3_2_1_17_1"},{"volume-title":"USENIX Security","year":"2014","author":"Li Z.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_36"},{"volume-title":"The scrypt password-based key derivation function","year":"2012","author":"Percival C.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Numerical Recipes: The Art of Scientific Computing","author":"Press W. H.","year":"2007","edition":"3"},{"volume-title":"Password 12 workshop","year":"2012","author":"Designer Solar","key":"e_1_3_2_1_25_1"},{"volume-title":"USENIX Security","year":"1992","author":"Spafford E. H.","key":"e_1_3_2_1_26_1"},{"volume-title":"USENIX Security","year":"2012","author":"Ur B.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813631"}},"subtitle":["Fast and Reliable Password Checking"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":30,"alternative-id":["10.1145\/2810103.2813631","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813631","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}