{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:09:48Z","timestamp":1730344188741,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973619","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T15:28:35Z","timestamp":1500996515000},"page":"1275-1279","source":"Crossref","is-referenced-by-count":4,"title":["Resilience of students' passwords against attacks"],"prefix":"10.23919","author":[{"given":"Bostjan","family":"Brumen","sequence":"first","affiliation":[]},{"given":"Tadej","family":"Makari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2014.07.007"},{"key":"ref31","article-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"281","year":"1995","journal-title":"Rule Number 95\/46\/EC Bruxelles Official Journal L"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859780"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34210-3_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00003-Q"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518226"},{"key":"ref14","article-title":"The memorability and security of passwords: some empirical results","author":"yan","year":"2000","journal-title":"Technical report # UCAM-CL-TR-500 Cambridge"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(84)90040-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2010.17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3601-9_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2011.6"},{"key":"ref4","article-title":"Pastor outed on Ashley Madison commits suicide","author":"segall","year":"2015","journal-title":"CNNMoneyTech"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.02.008"},{"journal-title":"Open Sources Voices from the Open Source Revolution","year":"1999","author":"dibona","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280703"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4878-5_2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859779"},{"key":"ref8","article-title":"Password Policy: The Good, the Bad, and the Ugly","author":"summers","year":"2004","journal-title":"Winter International Synposium on Information and Communication Technologies"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"ref2","article-title":"The Compatible Time Sharing System (1961&#x2013;1973)","author":"corbat\u00f3","year":"2011","journal-title":"Fiftieth Anniversary Commemorative Overview"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.12.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137281"},{"key":"ref22","article-title":"Position: The User is the Enemy","author":"vidyaraman","year":"2007","journal-title":"Proceedings of the 2007 Workshop on New Security Paradigms"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_29"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.108"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija, Croatia","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973619.pdf?arnumber=7973619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T12:00:09Z","timestamp":1502884809000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973619","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}