{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:45Z","timestamp":1750306485789,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Technische Universit\u00e4t Darmstadt"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818043","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"431-440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing"],"prefix":"10.1145","author":[{"given":"Peter","family":"Mayer","sequence":"first","affiliation":[{"name":"SECUSO - Security, Usability and Society, Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"SECUSO - Security, Usability and Society, Technische Universit\u00e4t Darmstadt, Germany, Privacy and Security Research Group, Karlstad University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Department of Commerce - National Institute of Standards and Technology","author":"Barker E.","year":"2012","unstructured":"E. Barker , W. Barker , W. Burr , W. Polk , and M. Smid . NIST Special Publication 800-57 - Recommendation for Key Management Part 1: General (Revision 3). U.S . Department of Commerce - National Institute of Standards and Technology , 2012 . E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. NIST Special Publication 800-57 - Recommendation for Key Management Part 1: General (Revision 3). U.S. Department of Commerce - National Institute of Standards and Technology, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_3_1","volume-title":"WEIS '10: The 9th Workshop on the Economics of Information Security","author":"Bonneau J.","year":"2010","unstructured":"J. Bonneau and S. Preibusch . The password thicket: technical and market failures in human authentication on the web . WEIS '10: The 9th Workshop on the Economics of Information Security , 2010 . J. Bonneau and S. Preibusch. The password thicket: technical and market failures in human authentication on the web. WEIS '10: The 9th Workshop on the Economics of Information Security, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"Information Sciences","author":"Bozkurt N.","year":"2008","unstructured":"l. N. Bozkurt , K. Kaya , A. A. Sel\u00e7uk , and A. M. G\u00fcloglu . Threshold Cryptography Based on Blakley Secret Sharing . Information Sciences , 2008 . l. N. Bozkurt, K. Kaya, A. A. Sel\u00e7uk, and A. M. G\u00fcloglu. Threshold Cryptography Based on Blakley Secret Sharing. Information Sciences, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-1-4471-0515-2_27"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_7_1","first-page":"45","volume-title":"USENIX Security Symposium","author":"Dhamija R.","year":"2000","unstructured":"R. Dhamija and A. Perrig . Deja vu: A user study using images for authentication . In USENIX Security Symposium , pages 45 -- 58 , 2000 . R. Dhamija and A. Perrig. Deja vu: A user study using images for authentication. In USENIX Security Symposium, pages 45--58, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_9_1","volume-title":"Request for Comments: 4086 - Randomness Requirements for Security","author":"Eastlake D.","year":"2005","unstructured":"D. Eastlake , J. Schiller , and S. Crocker . Request for Comments: 4086 - Randomness Requirements for Security . The Internet Society , 2005 . D. Eastlake, J. Schiller, and S. Crocker. Request for Comments: 4086 - Randomness Requirements for Security. The Internet Society, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1837110.1837124"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2076732.2076754"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/TIT.1983.1056621"},{"key":"e_1_3_2_1_13_1","first-page":"204","volume-title":"Authentication Schemes - Comparison and Effective Password Spaces. In 10th International Conference on Information Systems Security","author":"Mayer P.","year":"2012","unstructured":"P. Mayer , M. Volkamer , and M. Kauer . Authentication Schemes - Comparison and Effective Password Spaces. In 10th International Conference on Information Systems Security , pages 204 -- 225 , 2012 . P. Mayer, M. Volkamer, and M. Kauer. Authentication Schemes - Comparison and Effective Password Spaces. In 10th International Conference on Information Systems Security, pages 204--225, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.2307\/1413251"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1037\/0278-7393.2.5.523"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.3758\/BF03331011"},{"key":"e_1_3_2_1_17_1","volume-title":"The Science Behind Passfaces","author":"Passfaces Corporation","year":"2006","unstructured":"Passfaces Corporation . The Science Behind Passfaces . Passfaces Corporation , 2006 . Passfaces Corporation. The Science Behind Passfaces. Passfaces Corporation, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/560729"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/ACSAC.2008.18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2501604.2501615"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_22_1","volume-title":"Password Storage Cheat Sheet (visited","author":"Steven J.","year":"2015","unstructured":"J. Steven and J. Manico . Password Storage Cheat Sheet (visited May 2015 ). https:\/\/www.owasp.org\/index.php\/Password_Storage_Cheat_Sheet. J. Steven and J. Manico. Password Storage Cheat Sheet (visited May 2015). https:\/\/www.owasp.org\/index.php\/Password_Storage_Cheat_Sheet."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/CSAC.2005.27"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1016\/0010-0285(73)90037-6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/2333112.2333114"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2335356.2335367"}],"event":{"sponsor":["ACSA Applied Computing Security Assoc"],"acronym":"ACSAC 2015","name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:28Z","timestamp":1750225708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":26,"alternative-id":["10.1145\/2818000.2818043","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818043","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}