{"id":"https://openalex.org/W2137395708","doi":"https://doi.org/10.1145/2799979.2799992","title":"Few notes towards making honeyword system more secure and usable","display_name":"Few notes towards making honeyword system more secure and usable","publication_year":2015,"publication_date":"2015-09-08","ids":{"openalex":"https://openalex.org/W2137395708","doi":"https://doi.org/10.1145/2799979.2799992","mag":"2137395708"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2799979.2799992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025685051","display_name":"Nilesh Chakraborty","orcid":"https://orcid.org/0000-0002-3825-8838"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nilesh Chakraborty","raw_affiliation_strings":["Indian Institute of Technology, Patna, Bihar, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology, Patna, Bihar, India","institution_ids":["https://openalex.org/I132153292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088675403","display_name":"Samrat Mondal","orcid":"https://orcid.org/0000-0002-2159-3410"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Samrat Mondal","raw_affiliation_strings":["Indian Institute of Technology, Patna, Bihar, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology, Patna, Bihar, India","institution_ids":["https://openalex.org/I132153292"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.034,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":13,"citation_normalized_percentile":{"value":0.761392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"237","last_page":"245"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9934,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9663,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.78399897},{"id":"https://openalex.org/keywords/dictionary-attack","display_name":"Dictionary attack","score":0.5906095},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.56370986},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.5311457},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.42340448}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9258045},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925185},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.78399897},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.5906095},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5797943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56705225},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.56370986},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.5311457},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.5202133},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.4621715},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.42340448},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28025132},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.26740688},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.26172546},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16570011},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11319023}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2799979.2799992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.55,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[{"funder":"https://openalex.org/F4320320719","funder_display_name":"Department of Science and Technology, Ministry of Science and Technology, India","award_id":"SB/FTP/ETA-226/2012"}],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W178526229","https://openalex.org/W1811376871","https://openalex.org/W2054626033","https://openalex.org/W2093397575","https://openalex.org/W2135359429","https://openalex.org/W2167154815","https://openalex.org/W93892664"],"related_works":["https://openalex.org/W4283800360","https://openalex.org/W4239831152","https://openalex.org/W4200254105","https://openalex.org/W3023581742","https://openalex.org/W3004925279","https://openalex.org/W2961081730","https://openalex.org/W2741533670","https://openalex.org/W2402445170","https://openalex.org/W2213939375","https://openalex.org/W2097945858"],"abstract_inverted_index":{"Traditionally":[0],"the":[1,10,18,28,45,65,72,98,106,127,134],"passwords":[2,30,35,47],"are":[3,41,94],"stored":[4],"in":[5],"hashed":[6],"format.":[7],"However,":[8],"if":[9],"password":[11],"file":[12],"is":[13,23,55,122],"compromised":[14],"then":[15],"by":[16],"using":[17],"brute":[19],"force":[20],"attack":[21],"there":[22],"a":[24,119],"high":[25,114],"chance":[26],"that":[27,105],"original":[29,46],"can":[31,112],"be":[32],"leaked.":[33],"False":[34],"--":[36,85],"also":[37],"known":[38],"as":[39,80],"honeywords,":[40],"used":[42],"to":[43,96,124,133],"protect":[44,113],"from":[48],"such":[49],"leak.":[50],"A":[51],"good":[52],"honeyword":[53,59,74,136],"system":[54],"dependent":[56],"on":[57],"effective":[58],"generation":[60,75,137],"techniques.":[61],"In":[62],"this":[63],"paper,":[64],"risk":[66],"and":[67,91],"limitations":[68],"of":[69,71,116],"some":[70,110],"existing":[73,99,135],"techniques":[76,108],"have":[77],"been":[78],"identified":[79],"different":[81],"notes.":[82],"Three":[83],"concepts":[84],"modified":[86],"tails,":[87],"close":[88],"number":[89],"formation":[90],"caps":[92],"key":[93],"introduced":[95],"address":[97],"issues.":[100],"The":[101],"experimental":[102],"analysis":[103,121],"shows":[104],"proposed":[107,128],"with":[109,131],"preprocessing":[111],"percentage":[115],"passwords.":[117],"Finally":[118],"comparative":[120],"presented":[123],"show":[125],"how":[126],"approaches":[129],"stand":[130],"respect":[132],"approaches.":[138]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2137395708","counts_by_year":[{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2024-12-12T04:36:57.042053","created_date":"2016-06-24"}