{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:37:17Z","timestamp":1732034237107,"version":"3.28.0"},"reference-count":51,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/sp.2012.38","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T18:39:03Z","timestamp":1342723143000},"page":"523-537","source":"Crossref","is-referenced-by-count":188,"title":["Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms"],"prefix":"10.1109","author":[{"given":"Patrick Gage","family":"Kelley","sequence":"first","affiliation":[]},{"given":"Saranga","family":"Komanduri","sequence":"additional","affiliation":[]},{"given":"Michelle L.","family":"Mazurek","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Shay","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Vidas","sequence":"additional","affiliation":[]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1314403.1314405"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0084-3"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3601-9_1"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"39","article-title":"Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks","author":"schechter","year":"0","journal-title":"Proc HotSec'10 2010"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0064-y"},{"key":"42","article-title":"Adaptive Password-Strength meters from markov models","author":"castelluccia","year":"2012","journal-title":"Proceedings of NDSS 2012"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.35"},{"key":"23","article-title":"On user choice in graphical password schemes","author":"davis","year":"0","journal-title":"Proc Usenix Security Symposium 2004"},{"key":"24","article-title":"If your password is 123456, just make it hackme","author":"vance","year":"2010","journal-title":"New York Times"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"26","first-page":"169","article-title":"Attitudes and practices of students towards password security","volume":"23","author":"hart","year":"2008","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"27","article-title":"Fast dictionary attacks on passwords using time-space tradeoff","author":"narayanan","year":"0","journal-title":"Proc CCS 2005"},{"key":"28","article-title":"Password security: An empirical study","volume":"15","author":"zviran","year":"1999","journal-title":"J Mgt Inform Syst"},{"key":"29","article-title":"Order and entropy in picture passwords","author":"komanduri","year":"2008","journal-title":"Graphics Interface"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00003-Q"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"journal-title":"'Military Meltdown Monday' 90k Military Usernames Hashes Released","year":"2011","author":"bright","key":"7"},{"key":"30","article-title":"What's in a name? Evaluating statistical attacks on personal knowledge questions","author":"bonneau","year":"2010","journal-title":"Proc Financial Cryptography 2010"},{"journal-title":"The Gawker Hack How a Million Passwords Were Lost","year":"2010","author":"bonneau","key":"6"},{"journal-title":"Anonymous Speaks The Inside Story of the HBGary Hack","year":"2011","author":"bright","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.03.007"},{"journal-title":"Sony Stresses That PSN Passwords Were Hashed","year":"2011","author":"constantin","key":"4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979277"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753688"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"journal-title":"Demographics of Mechanical Turk","year":"2010","author":"ipeirotis","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753873"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-63v1.0.2","author":"burr","year":"2006","journal-title":"Electronic Authentication Guideline"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195438"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"journal-title":"Hadoop The Definitive Guide","year":"2010","author":"white","key":"48"},{"journal-title":"John the Ripper","year":"1996","author":"designer","key":"45"},{"journal-title":"Using Probabilistic Techniques to Aid in Password Cracking Attacks","year":"2010","author":"weir","key":"44"},{"journal-title":"Myspace Passwords Aren't so Dumb","year":"2006","author":"schneier","key":"47"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"10","article-title":"Password exhaustion: Predicting the end of password usefulness","author":"st clair","year":"0","journal-title":"Proceedings of the ICISS 2006"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_4"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1951.tb01366.x"}],"event":{"name":"2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change","start":{"date-parts":[[2012,5,20]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2012,5,23]]}},"container-title":["2012 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6233637\/6234400\/06234434.pdf?arnumber=6234434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:36:01Z","timestamp":1497994561000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6234434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/sp.2012.38","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}