{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:11:31Z","timestamp":1726470691286},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["SB\/FTP\/ETA-226\/2012"],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1016\/j.cose.2017.01.011","type":"journal-article","created":{"date-parts":[[2017,2,6]],"date-time":"2017-02-06T07:47:15Z","timestamp":1486367235000},"page":"155-168","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"special_numbering":"C","title":["On designing a modified-UI based honeyword generation approach for overcoming the existing limitations"],"prefix":"10.1016","volume":"66","author":[{"given":"Nilesh","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2013","series-title":"Improving security using deception. Technical report. Technical report CERIAS Tech report 2013-13","author":"Almeshekah","key":"10.1016\/j.cose.2017.01.011_bib0010"},{"key":"10.1016\/j.cose.2017.01.011_bib0015","series-title":"Proceedings of the 31st annual computer security applications conference","first-page":"311","article-title":"Ersatzpasswords: ending password cracking and detecting password leakage","author":"Almeshekah","year":"2015"},{"year":"2010","series-title":"GPU-based password cracking","author":"Bakker","key":"10.1016\/j.cose.2017.01.011_bib0020"},{"key":"10.1016\/j.cose.2017.01.011_bib0025","series-title":"Computer security\u2013ESORICS 2010","first-page":"286","article-title":"Kamouflage: loss-resistant password management","author":"Bojinov","year":"2010"},{"key":"10.1016\/j.cose.2017.01.011_bib0035","series-title":"Security and privacy (SP), 2012 IEEE symposium on, IEEE","first-page":"538","article-title":"The science of guessing: analyzing an anonymized corpus of 70 million passwords","author":"Bonneau","year":"2012"},{"author":"Burnett","key":"10.1016\/j.cose.2017.01.011_bib0040"},{"key":"10.1016\/j.cose.2017.01.011_bib0045","series-title":"High performance computing & simulation (HPCS), 2015 international conference on, IEEE","first-page":"187","article-title":"A honeypot system with honeyword-driven fake interactive sessions","author":"Catuogno","year":"2015"},{"key":"10.1016\/j.cose.2017.01.011_bib0050","series-title":"Security in computing and communications","first-page":"101","article-title":"Tag digit based honeypot to detect shoulder surfing attack","author":"Chakraborty","year":"2014"},{"key":"10.1016\/j.cose.2017.01.011_bib0055","series-title":"Proceedings of the 8th international conference on security of information and networks","first-page":"237","article-title":"Few notes towards making honeyword system more secure and usable","author":"Chakraborty","year":"2015"},{"key":"10.1016\/j.cose.2017.01.011_bib0060","series-title":"Handbook of information security","first-page":"646","article-title":"The use of deception techniques: honeypots and decoys","author":"Cohen","year":"2006"},{"key":"10.1016\/j.cose.2017.01.011_bib0065","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","article-title":"An improved data stream summary: the count-min sketch and its applications","volume":"55","author":"Cormode","year":"2005","journal-title":"J Algorithms"},{"key":"10.1016\/j.cose.2017.01.011_bib0070","series-title":"NDSS","first-page":"23","article-title":"The tangled web of password reuse","author":"Das","year":"2014"},{"key":"10.1016\/j.cose.2017.01.011_bib0075","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/TDSC.2015.2406707","article-title":"Achieving flatness: selecting the honeywords from existing user passwords","volume":"13","author":"Erguler","year":"2016","journal-title":"IEEE Trans Dependable Sec Comput"},{"key":"10.1016\/j.cose.2017.01.011_bib0080","article-title":"Linkedin, last. fm, now yahoo? Don't ignore news of a password breach","volume":"13","author":"Gaylord","year":"2012","journal-title":"Christ Sci Monitor (East Ed)"},{"key":"10.1016\/j.cose.2017.01.011_bib0085","series-title":"Passwords12 conference","article-title":"Password cracking hpc","author":"Gosney","year":"2012"},{"key":"10.1016\/j.cose.2017.01.011_bib0090","series-title":"CNN","article-title":"50 million compromised in evernote hack","author":"Gross","year":"2013"},{"key":"10.1016\/j.cose.2017.01.011_bib0095","series-title":"International workshop on cryptographic hardware and embedded systems","first-page":"119","article-title":"Comparing elliptic curve cryptography and rsa on 8-bit cpus","author":"Gura","year":"2004"},{"key":"10.1016\/j.cose.2017.01.011_bib0100","series-title":"22nd annual network and distributed system security symposium, NDSS 2015","article-title":"Knock yourself out: secure authentication with short re-usable passwords","author":"G\u00fcldenring","year":"2015"},{"key":"10.1016\/j.cose.2017.01.011_bib0105","series-title":"Proceedings of the Ifip Tc 11 23rd international information security conference","first-page":"681","article-title":"Protecting financial institutions from brute-force attacks","author":"Herley","year":"2008"},{"author":"John the Ripper","key":"10.1016\/j.cose.2017.01.011_bib0110"},{"key":"10.1016\/j.cose.2017.01.011_bib0115","series-title":"Proceedings of the 2013 ACM SIGSAC conference on computer & communications security","first-page":"145","article-title":"Honeywords: making password-cracking detectable","author":"Juels","year":"2013"},{"key":"10.1016\/j.cose.2017.01.011_bib0120","series-title":"Security and privacy (SP), 2012 IEEE symposium on, IEEE","first-page":"523","article-title":"Guess again (and again and again): measuring password strength by simulating password-cracking algorithms","author":"Kelley","year":"2012"},{"key":"10.1016\/j.cose.2017.01.011_bib0125","series-title":"European symposium on algorithms","first-page":"456","article-title":"Less hashing, same performance: building a better Bloom filter","author":"Kirsch","year":"2006"},{"key":"10.1016\/j.cose.2017.01.011_bib0130","series-title":"Proceedings of the 2013 ACM SIGSAC conferenceon computer & communications security","first-page":"187","article-title":"Sauth: protecting user accounts from password database leaks","author":"Kontaxis","year":"2013"},{"key":"10.1016\/j.cose.2017.01.011_bib0135","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TSMC.2013.2270227","article-title":"Covert attentional shoulder surfing: human adversaries are more powerful than expected","volume":"44","author":"Kwon","year":"2014","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10.1016\/j.cose.2017.01.011_bib0140","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.cose.2015.06.006","article-title":"Secure bimodal pin-entry method using audio signals","volume":"56","author":"Lee","year":"2016","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2017.01.011_bib0145","series-title":"Security and privacy (SP), 2014 IEEE symposium on, IEEE","first-page":"689","article-title":"A study of probabilistic password models","author":"Ma","year":"2014"},{"key":"10.1016\/j.cose.2017.01.011_bib0150","series-title":"Network and system security (NSS), 2010 4th international conference on, IEEE","first-page":"583","article-title":"Password entropy and password quality","author":"Ma","year":"2010"},{"key":"10.1016\/j.cose.2017.01.011_bib0155","series-title":"2009 30th IEEE symposium on security and privacy, IEEE","first-page":"173","article-title":"De-anonymizing social networks","author":"Narayanan","year":"2009"},{"key":"10.1016\/j.cose.2017.01.011_bib0160","series-title":"International symposium on privacy enhancing technologies symposium","first-page":"1","article-title":"How unique and traceable are usernames?","author":"Perito","year":"2011"},{"key":"10.1016\/j.cose.2017.01.011_bib0165","series-title":"USENIX annual technical conference, FREENIX track","first-page":"81","article-title":"A future-adaptable password scheme","author":"Provos","year":"1999"},{"key":"10.1016\/j.cose.2017.01.011_bib0170","series-title":"Proceedings of the 5th USENIX conference on hot topics in security","first-page":"1","article-title":"Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks","author":"Schechter","year":"2010"},{"key":"10.1016\/j.cose.2017.01.011_bib0175","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.cose.2016.05.007","article-title":"User practice in password security: an empirical study of real-life passwords in the wild","volume":"61","author":"Shen","year":"2016","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2017.01.011_bib0180","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.cose.2016.08.003","article-title":"A phish detector using lightweight search features","volume":"62","author":"Varshney","year":"2016","journal-title":"Comput Secur"},{"key":"10.1016\/j.cose.2017.01.011_bib0185","series-title":"Computer security \u2013 ESORICS 2015 \u2013 20th European symposium on research in computer security, Vienna, Austria, September 21\u201325, 2015, proceedings, part II","first-page":"456","article-title":"The emperor's new password creation policies: an evaluation of leading web services and the effect of role in resisting against online guessing","author":"Wang","year":"2015"},{"year":"2016","series-title":"fuzzy psm: a new password strength meter using fuzzy probabilistic context-free grammars","author":"Wang","key":"10.1016\/j.cose.2017.01.011_bib0190"},{"key":"10.1016\/j.cose.2017.01.011_bib0195","series-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","first-page":"1242","article-title":"Targeted online password guessing: an underestimated threat","author":"Wang","year":"2016"},{"key":"10.1016\/j.cose.2017.01.011_bib0200","series-title":"Security and privacy, 2009 30th IEEE symposium on, IEEE","first-page":"391","article-title":"Password cracking using probabilistic context-free grammars","author":"Weir","year":"2009"},{"key":"10.1016\/j.cose.2017.01.011_bib0205","series-title":"Proc. USENIX security","article-title":"zxcvbn: low-budget password strength estimation","author":"Wheeler","year":"2016"},{"key":"10.1016\/j.cose.2017.01.011_bib0210","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1109\/TIFS.2014.2312547","article-title":"Captcha as graphical passwords a new security primitive based on hard ai problems","volume":"9","author":"Zhu","year":"2014","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404817300226?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404817300226?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T14:24:00Z","timestamp":1536071040000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404817300226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":40,"alternative-id":["S0167404817300226"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2017.01.011","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2017,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On designing a modified-UI based honeyword generation approach for overcoming the existing limitations","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2017.01.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}