{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T03:46:17Z","timestamp":1648784777737},"reference-count":25,"publisher":"Faculty of Electrical Engineering and Computing, Univ. of Zagreb","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIT"],"published-print":{"date-parts":[[2012]]},"DOI":"10.2498\/cit.1001983","type":"journal-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T06:03:37Z","timestamp":1355724217000},"source":"Crossref","is-referenced-by-count":1,"title":["A One-Time Server-Specific Password Authentication Scheme"],"prefix":"10.20532","volume":"20","author":[{"given":"Adebukola","family":"Onashoga","sequence":"first","affiliation":[]},{"given":"Adesina","family":"Sodiya","sequence":"additional","affiliation":[]},{"given":"A.","family":"Afolorunso","sequence":"additional","affiliation":[]}],"member":"8460","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"issue":"4","key":"ref3","first-page":"1213","article-title":"A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography","volume":"24","author":"Kim","year":"2008","unstructured":"[8] M. Kim and C. K. Koc, A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography, Journal of Information Science and Engineering, 2008, 24(4), pp. 1213\u20131227.","journal-title":"Journal of Information Science and Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/958965.958968"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/974104.974107"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/769782.769783"},{"issue":"No. 3","key":"ref8","first-page":"205","article-title":"A Hash-based Strong Password Authentication Protocolwith User Anonymity","volume":"2","year":"2006","unstructured":"[13] MANGIPUDI AND KATTI, A Hash-based Strong Password Authentication Protocolwith User Anonymity, International Journal of Network Security, 2006, Vol. 2, No. 3, pp. 205\u2013209.","journal-title":"International Journal of Network Security"},{"issue":"4","key":"ref9","first-page":"3715","article-title":"M.ALEX.M.LOK&A.MOHAMED, An anti-phishing Single Password Protocol","volume":"51","author":"Mohammed","year":"2007","unstructured":"[14] G.Mohammed.M.ALEX.M.LOK&A.MOHAMED, An anti-phishing Single Password Protocol, Journal of Computer and Telecommunications Networking, 2007, 51(4), pp. 3715\u20133726.","journal-title":"Journal of Computer and Telecommunications Networking"},{"key":"ref10","first-page":"161","article-title":"Securing Passwords Against Dictionary Attacks","volume-title":"Proceedings of the 9th ACM conference on computer and communications security 200","author":"Pinkas","year":"2003","unstructured":"[17] B. Pinkas and S. Thomas, Securing Passwords Against Dictionary Attacks, in Proceedings of the 9th ACM conference on computer and communications security 200, 2003, pp. 161\u2013170."},{"key":"ref11","volume-title":"A S SODIYA S A ONASHOGA AND O B AJAYI Towards Building Secure Software Systems","volume":"3","year":"2006","unstructured":"[21] A. S. SODIYA, S. A. ONASHOGA AND O. B. AJAYI, Towards Building Secure Software Systems, Issues in Informing Science and Information Technology, Vol. 3, 2006."},{"key":"ref12","first-page":"447","article-title":"E-commerce Authentication: An Effective Countermeasures Design Model","volume-title":"Proceedings of the 5th International Conference on Enterprise Information Systems","author":"Victor","year":"2004","unstructured":"[22] D. Victor and L. Robert, E-commerce Authentication: An Effective Countermeasures Design Model, in Proceedings of the 5th International Conference on Enterprise Information Systems, 2003, pp. 447\u2013455, 2004."},{"key":"ref13","volume-title":"Building Secure Software","author":"Viega","year":"2002","unstructured":"[23] J. Viega and G. Mcgraw, Building Secure Software, Addison-Wesley, 2002."},{"key":"ref14","volume-title":"Random Password Generator","year":"2010","unstructured":"[24] Wikipedia (2010), Random Password Generator, Free Encyclopedia"},{"key":"ref14","unstructured":"[1] R. Anderson, Security Engineering: A Guide to Building System, JohnWiley and Sons, 2001, ISBN: 0-471-389226-6."},{"key":"ref14","unstructured":"[2] Anti-phishingWorking Group (2007), Phishing activity trend: Report for themonth ofNovember 2007, http:\/\/www.antiphishing.org\/reports\/apwgreportnov2007.pdf"},{"key":"ref14","unstructured":"[3] R. Blake, J. Collin and M. Nick, Stronger Password Authentication: using Browser Extentions, 2002."},{"key":"ref14","unstructured":"[4] M. Charles, Authentication System: Password and Passphare, 2005, Retrieved from http:\/\/www.xtermin.ud."},{"key":"ref14","unstructured":"[6] P. Herzog, The Open Source Security Testing Methodology Manual, version 1.5, 2001, Retrieved from http:\/\/www.ideahanster.org"},{"key":"ref14","unstructured":"[15] NIST, National Institute of Standard and Technology (2001), Underlying Technical Models for information Technology Security, Special Publication 800-33 Retrived from http:\/\/www.csrc.nist.gov\/publications"},{"key":"ref14","unstructured":"[16] J. Owens and J. Mathew, A Study of Password andMethod used in Brute-Force SSHAttacks, 2008, http:\/\/people.clarkson.edu\/owensjp\/pobs"},{"key":"ref14","unstructured":"[18] R. Probert and V. Sowma, E-commerce Security: A New Methodology for Deriving Effective Countermeasures Design Models, in Proceedings of the 16th Annual Federal Information System Security Educator's Association (FISSEA) Conference, 2003, http:\/\/csrc.nist.gov\/organisations\/fisseal"},{"key":"ref14","unstructured":"[19] A. Scott-Chapman, Perimeter based, Community-Centric Access Control System, M. sc. Thesis, Florida State University, 2006."},{"key":"ref14","unstructured":"[20] S. Seungjae, C. Jerry, R. Jungwoo and E. T. Jack, A study of two-factor authentication against on-line identity theft, in Proceedings of the 39th Annual Meeting of Decision Science Institute, DSI 2008."},{"key":"ref14","unstructured":"[25] The CAPTCHA Project: http:\/\/www.captcha.net\/"}],"container-title":["Journal of Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/cit.fer.hr\/index.php\/CIT\/article\/view\/1983\/1531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T22:00:01Z","timestamp":1481580001000},"score":1,"resource":{"primary":{"URL":"http:\/\/cit.srce.unizg.hr\/index.php\/CIT\/article\/view\/1983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6]]}},"URL":"https:\/\/doi.org\/10.2498\/cit.1001983","relation":{},"ISSN":["1330-1136"],"issn-type":[{"value":"1330-1136","type":"print"}],"subject":[],"published":{"date-parts":[[2012]]}}}