{"id":"https://openalex.org/W2134909295","doi":"https://doi.org/10.1145/1178618.1178619","title":"On countering online dictionary attacks with login histories and humans-in-the-loop","display_name":"On countering online dictionary attacks with login histories and humans-in-the-loop","publication_year":2006,"publication_date":"2006-08-01","ids":{"openalex":"https://openalex.org/W2134909295","doi":"https://doi.org/10.1145/1178618.1178619","mag":"2134909295"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1178618.1178619","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://www.scs.carleton.ca/~paulv/papers/tissec-aug06.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"funder","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Paul C. Van Oorschot","raw_affiliation_strings":["Carleton University / Ottawa / Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University / Ottawa / Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113485443","display_name":"Stuart G. Stubblebine","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stuart Stubblebine","raw_affiliation_strings":["Stubblebine Research Labs, New Jersey"],"affiliations":[{"raw_affiliation_string":"Stubblebine Research Labs, New Jersey","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.81,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":68,"citation_normalized_percentile":{"value":0.983583,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"9","issue":"3","first_page":"235","last_page":"258"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.8860415}],"concepts":[{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.8860415},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033006},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.66229284},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4963649},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47653732},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.47200322},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.074347764},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1178618.1178619","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.9814","pdf_url":"http://www.scs.carleton.ca/~paulv/papers/tissec-aug06.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.9814","pdf_url":"http://www.scs.carleton.ca/~paulv/papers/tissec-aug06.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.55}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1559498407","https://openalex.org/W1595293097","https://openalex.org/W1601379374","https://openalex.org/W1603565383","https://openalex.org/W1605786385","https://openalex.org/W1660562555","https://openalex.org/W1862271745","https://openalex.org/W1973039301","https://openalex.org/W1994386233","https://openalex.org/W1998350371","https://openalex.org/W2001771035","https://openalex.org/W2035164471","https://openalex.org/W2061956102","https://openalex.org/W2072410439","https://openalex.org/W2100783932","https://openalex.org/W2123544182","https://openalex.org/W2125927592","https://openalex.org/W2133432179","https://openalex.org/W2135300639","https://openalex.org/W2138574741","https://openalex.org/W2145482038","https://openalex.org/W2156186849","https://openalex.org/W2157604883","https://openalex.org/W2161433742","https://openalex.org/W2167006959","https://openalex.org/W2394489512","https://openalex.org/W2561675875","https://openalex.org/W3150288774","https://openalex.org/W3157510886","https://openalex.org/W87207416"],"related_works":["https://openalex.org/W4315650027","https://openalex.org/W4256170434","https://openalex.org/W4243085862","https://openalex.org/W4238894392","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W4235220108","https://openalex.org/W4233948907","https://openalex.org/W2357607877","https://openalex.org/W107495730"],"abstract_inverted_index":{"Automated":[0],"Turing":[1],"Tests":[2],"(ATTs),":[3],"also":[4,75],"known":[5],"as":[6],"human-in-the-loop":[7],"techniques,":[8],"were":[9],"recently":[10],"employed":[11],"in":[12],"a":[13,31],"login":[14,34],"protocol":[15,35,47,66],"by":[16],"Pinkas":[17],"and":[18,53,61,72,80,102],"Sander":[19],"(2002)":[20],"to":[21,58,87,98,103],"protect":[22],"against":[23],"online":[24],"password-guessing":[25],"attacks.":[26,93],"We":[27,74,94],"present":[28],"modifications":[29],"providing":[30],"new":[32,46],"history-based":[33],"with":[36],"ATTs,":[37],"which":[38],"uses":[39],"failed-login":[40],"counts.":[41],"Analysis":[42],"indicates":[43],"that":[44,77],"the":[45,78,105,108],"offers":[48],"opportunities":[49],"for":[50,69],"improved":[51],"security":[52,106],"user":[54],"friendliness":[55],"(fewer":[56],"ATTs":[57,84],"legitimate":[59],"users)":[60],"greater":[62],"flexibility":[63],"(e.g.,":[64],"allowing":[65],"parameter":[67],"customization":[68],"particular":[70],"situations":[71],"users).":[73],"note":[76],"Pinkas--Sander":[79],"other":[81],"protocols":[82],"involving":[83],"are":[85],"susceptible":[86],"minor":[88],"variations":[89],"of":[90,107],"well-known":[91],"middle-person":[92],"discuss":[95],"complementary":[96],"techniques":[97],"address":[99],"such":[100],"attacks,":[101],"augment":[104],"original":[109],"protocol.":[110]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2134909295","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":16},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2025-03-18T20:26:56.466566","created_date":"2016-06-24"}