{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T07:50:41Z","timestamp":1677484241478},"reference-count":52,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1049\/iet-ifs.2017.0538","type":"journal-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T02:23:35Z","timestamp":1528338215000},"page":"7-18","source":"Crossref","is-referenced-by-count":2,"title":["Towards incorporating honeywords in n\u2010session recording attack resilient unaided authentication services"],"prefix":"10.1049","volume":"13","author":[{"given":"Nilesh","family":"Chakraborty","sequence":"first","affiliation":[{"name":"Department of Computer Science & EngineeringIndian Institute of Technology PatnaPatnaBihar801103India"}]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[{"name":"Department of Computer Science & EngineeringIndian Institute of Technology PatnaPatnaBihar801103India"}]}],"member":"265","published-online":{"date-parts":[[2019,1]]},"reference":[{"key":"e_1_2_11_2_2","unstructured":"Pham T.: \u2018Four years later anthem breached again: hackers stole credentials\u2019 February2015. Available athttp:\/\/bit.ly\/2btkw6K"},{"key":"e_1_2_11_3_2","unstructured":"Fox\u2010Brewster T.: \u201813\u00a0million passwords appear to have leaked from 000webhost\u2019 October2015. Available athttp:\/\/bit.ly\/1ReXjn7"},{"issue":"4","key":"e_1_2_11_4_2","first-page":"439","article-title":"A survey of password attacks and comparative analysis on methods for secure authentication","volume":"19","author":"Raza M.","year":"2012","journal-title":"World Appl. Sci. J."},{"issue":"5","key":"e_1_2_11_5_2","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1093\/comjnl\/bxh169","article-title":"Protecting users against phishing attacks","volume":"49","author":"Kirda E.","year":"2006","journal-title":"Comput. J."},{"key":"e_1_2_11_6_2","doi-asserted-by":"crossref","unstructured":"Weir M. Aggarwal S. De\u2010Medeiros B.et al: \u2018Password cracking using probabilistic context\u2010free grammars\u2019.2009 30th IEEE Symp. on Security and Privacy Oakland California 2009 pp.391\u2013405","DOI":"10.1109\/SP.2009.8"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"Bai X. Gu W. Chellappan S.et al: \u2018PAS: predicate\u2010based authentication services against powerful passive adversaries\u2019.Annual Computer Security Applications Conf. 2008 ACSAC 2008 Anaheim California USA 2008 pp.433\u2013442","DOI":"10.1109\/ACSAC.2008.23"},{"key":"e_1_2_11_8_2","doi-asserted-by":"crossref","unstructured":"Hopper N.J. Blum M.: \u2018Secure human identification protocols\u2019.Advances in Cryptology ASIACRYPT 2001 Australia 2001 pp.52\u201366","DOI":"10.1007\/3-540-45682-1_4"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"Matsumoto T. Imai H.: \u2018Human identification through insecure channel\u2019.Advances in Cryptology EUROCRYPT'91 Brighton UK 1991 pp.409\u2013421","DOI":"10.1007\/3-540-46416-6_35"},{"key":"e_1_2_11_10_2","doi-asserted-by":"crossref","unstructured":"Wiedenbeck S. Waters J. Sobrado L.et al: \u2018Design and evaluation of a shoulder\u2010surfing resistant graphical password scheme\u2019.Proc. of the working Conf. on Advanced Visual Interfaces Venezia Italy 2006 pp.177\u2013184","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_2_11_11_2","unstructured":"Perkovi\u0107 T. \u010cagalj M. Raki\u0107 N.: \u2018SSSL: shoulder surfing safe login\u2019.17th Int. Conf. on Software Telecommunications & Computer Networks 2009 SoftCOM 2009 Hvar\u2010Korcula Croatia 2009 pp.270\u2013275"},{"key":"e_1_2_11_12_2","unstructured":"Yan Q. Han J. Li Y.et al: \u2018On limitations of designing leakage\u2010resilient password systems: attacks principles and usability\u2019 2012"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"Zhao H. Li X.: \u2018S3PAS: A scalable shoulder\u2010surfing resistant textual\u2010graphical password authentication scheme\u2019.21st Int. Conf. on Advanced Information Networking and Applications Workshops 2007 AINAW'07 Ontario Canada 2007 vol. 2 pp.467\u2013472","DOI":"10.1109\/AINAW.2007.317"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","unstructured":"De\u2010Luca A. Hertzschuch K. Hussmann H.: \u2018Colorpin: securing pin entry through indirect input\u2019.Proc. of the SIGCHI Conf. on Human Factors in Computing Systems Atlanta GA USA 2010 pp.1103\u20131106","DOI":"10.1145\/1753326.1753490"},{"key":"e_1_2_11_15_2","doi-asserted-by":"crossref","unstructured":"Asghar H.J. Pieprzyk J. Wang H.: \u2018A new human identification protocol and coppersmith's baby\u2010step giant\u2010step algorithm\u2019.Int. Conf. on Applied Cryptography and Network Security Beijing China 2010 pp.349\u2013366","DOI":"10.1007\/978-3-642-13708-2_21"},{"issue":"3","key":"e_1_2_11_16_2","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s10207-013-0216-7","article-title":"Shoulder\u2010surfing\u2010proof graphical password authentication scheme","volume":"13","author":"Wu T.S.","year":"2014","journal-title":"Int. J. Inf. Secur."},{"key":"e_1_2_11_17_2","doi-asserted-by":"crossref","unstructured":"Weinshall D.: \u2018Cognitive authentication schemes safe against spyware\u2019.2006 IEEE Symp. on Security and Privacy California USA 2006 pp.6\u201311","DOI":"10.1109\/SP.2006.10"},{"key":"e_1_2_11_18_2","doi-asserted-by":"crossref","unstructured":"Juels A. Rivest R.L.: \u2018Honeywords: making password\u2010cracking detectable\u2019.Proc. of the 2013 ACM SIGSAC Conf. on Computer & Communications Security Berlin Germany 2013 pp.145\u2013160","DOI":"10.1145\/2508859.2516671"},{"key":"e_1_2_11_19_2","volume-title":"Cryptography and network security (Sie)","author":"Forouzan B.A.","year":"2011"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"Bonneau J. Herley C. Van Oorschot P.C.et al: \u2018The quest to replace passwords: A framework for comparative evaluation of web authentication schemes\u2019.2012 IEEE Symp. on Security and Privacy (SP) California USA 2012 pp.553\u2013567","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_2_11_21_2","unstructured":"Gross D.: \u201850\u00a0million compromised in Evernote hack.CNN\u2019 2013"},{"key":"e_1_2_11_22_2","article-title":"Linkedin, last. fm, now yahoo? Don't ignore news of a password breach","author":"Gaylord C.","year":"2012","journal-title":"Christ. Sci. Monitor"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"Herley C. Flor\u00eancio D.: \u2018Protecting financial institutions from brute\u2010force attacks\u2019.Proc. of the Ifip Tc 11 23rd Int. Information Security Conf. Milano Italy 2008 pp.681\u2013685","DOI":"10.1007\/978-0-387-09699-5_45"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"Catuogno L. Castiglione A. Palmieri F.: \u2018A honeypot system with honeyword\u2010driven fake interactive sessions\u2019.2015 Int. Conf. on High Performance Computing & Simulation (HPCS) Amsterdam Netherlands 2015 pp.187\u2013194","DOI":"10.1109\/HPCSim.2015.7237039"},{"key":"e_1_2_11_25_2","doi-asserted-by":"crossref","unstructured":"Takada T.: \u2018Fakepointer: An authentication scheme for improving security against peeping attacks using video cameras\u2019.The Second Int. Conf. on Mobile Ubiquitous Computing Systems Services and Technologies 2008. UBICOMM'08 Valencia Spain 2008 pp.395\u2013400","DOI":"10.1109\/UBICOMM.2008.76"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"Kim D. Dunphy P. Briggs P.et al: \u2018Multi\u2010touch authentication on tabletops\u2019.Proc. of the SIGCHI Conf. on Human Factors in Computing Systems Atlanta GA USA 2010 pp.1093\u20131102","DOI":"10.1145\/1753326.1753489"},{"issue":"4","key":"e_1_2_11_27_2","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1080\/19393555.2015.1115927","article-title":"Secure graphical one time password (gotpass): an empirical study","volume":"24","author":"Alsaiari H.","year":"2015","journal-title":"Inf. Secur. J., A Glob. Perspect."},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2539942"},{"key":"e_1_2_11_29_2","volume-title":"Honeypots: tracking hackers","author":"Spitzner L.","year":"2003"},{"key":"e_1_2_11_30_2","unstructured":"Kim G.H. Spafford E.H.: \u2018Experiences with tripwire: using integrity checkers for intrusion detection\u2019 1994"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"Juels A. Ristenpart T.: \u2018Honey encryption: security beyond the brute\u2010force bound\u2019.Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques Copenhagen Denmark 2014 pp.293\u2013310","DOI":"10.1007\/978-3-642-55220-5_17"},{"issue":"4","key":"e_1_2_11_32_2","first-page":"29","article-title":"Anomaly detection in computer networks: a state\u2010of\u2010the\u2010art review","volume":"5","author":"Baddar S.W.A.H.","year":"2014","journal-title":"JoWUA"},{"key":"e_1_2_11_33_2","article-title":"Two birds with one stone: two\u2010factor authentication with security beyond conventional bound","author":"Wang D.","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.007"},{"key":"e_1_2_11_35_2","doi-asserted-by":"crossref","unstructured":"Ma J. Yang W. Luo M.et al: \u2018A study of probabilistic password models\u2019.2014 IEEE Symp. on Security and Privacy (SP) San Jose California USA 2014 pp.689\u2013704","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_2_11_36_2","unstructured":"Gosney J.: \u2018Password cracking hpc\u2019.Passwords'12 Conf. Oslo Norway 2012"},{"key":"e_1_2_11_37_2","doi-asserted-by":"crossref","unstructured":"Kontaxis G. Athanasopoulos E. Portokalidis G.et al: \u2018Sauth: protecting user accounts from password database leaks\u2019.Proc. of the 2013 ACM SIGSAC Conf. on Computer & Communications Security Berlin Germany 2013 pp.187\u2013198","DOI":"10.1145\/2508859.2516746"},{"key":"e_1_2_11_38_2","unstructured":"Sher A.M.: \u2018Enhanced roulette\u2010style game\u2019. Google Patents 1998 US Patent 5 755 440"},{"issue":"2","key":"e_1_2_11_39_2","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/TDSC.2015.2406707","article-title":"Achieving flatness: selecting the honeywords from existing user passwords","volume":"13","author":"Erguler I.","year":"2016","journal-title":"IEEE Trans. Dependable. Sec. Comput."},{"key":"e_1_2_11_40_2","doi-asserted-by":"crossref","unstructured":"Bojinov H. Bursztein E. Boyen X.et al: \u2018Kamouflage: loss\u2010resistant password management\u2019.Computer Security\u2013ESORICS 2010 Athens Greece 2010 pp.286\u2013302","DOI":"10.1007\/978-3-642-15497-3_18"},{"issue":"4","key":"e_1_2_11_41_2","first-page":"421","article-title":"Memory\u2010scanning: mental processes revealed by reaction\u2010time experiments","volume":"57","author":"Sternberg S.","year":"1969","journal-title":"Am. Sci."},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.27.2.384"},{"issue":"4","key":"e_1_2_11_43_2","doi-asserted-by":"crossref","first-page":"808","DOI":"10.1080\/13506280500197397","article-title":"The role of working memory and long\u2010term memory in visual search","volume":"14","author":"Woodman G.F.","year":"2006","journal-title":"Vis. Cogn."},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.130.2.299"},{"key":"e_1_2_11_45_2","doi-asserted-by":"publisher","DOI":"10.1177\/0963721409359277"},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.1080\/09541440701688793"},{"issue":"2","key":"e_1_2_11_47_2","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3758\/BF03196569","article-title":"Visual search is slowed when visuospatial working memory is occupied","volume":"11","author":"Woodman G.F.","year":"2004","journal-title":"Psychonomic Bull. Rev."},{"key":"e_1_2_11_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(71)80029-4"},{"key":"e_1_2_11_49_2","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.cose.2017.01.011","article-title":"On designing a modified\u2010UI based honeyword generation approach for overcoming the existing limitations","volume":"66","author":"Chakraborty N.","year":"2017","journal-title":"Comput. Secur."},{"issue":"2","key":"e_1_2_11_50_2","doi-asserted-by":"crossref","first-page":"272","DOI":"10.3758\/BF03194468","article-title":"Search for multiple targets: remember the targets, forget the search","volume":"63","author":"Horowitz T.S.","year":"2001","journal-title":"Percept. Psychophys."},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.003"},{"key":"e_1_2_11_52_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1061"},{"key":"e_1_2_11_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.04.003"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2017.0538","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ifs.2017.0538","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2017.0538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T22:35:08Z","timestamp":1610577308000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ifs.2017.0538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1049\/iet-ifs.2017.0538"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2017.0538","archive":["Portico"],"relation":{},"ISSN":["1751-8717","1751-8717"],"issn-type":[{"value":"1751-8717","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}