{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:28:43Z","timestamp":1730320123021,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1999,11]]},"DOI":"10.1145\/319709.319720","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T10:21:59Z","timestamp":1075803719000},"page":"73-82","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":146,"title":["Password hardening based on keystroke dynamics"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Monrose","sequence":"first","affiliation":[{"name":"Bell Labs, Lucent Technologies, Murray Hill, NJ"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"Bell Labs, Lucent Technologies, Murray Hill, NJ"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Bell Labs, Lucent Technologies, Murray Hill, NJ"}]}],"member":"320","published-online":{"date-parts":[[1999,11]]},"reference":[{"key":"e_1_3_2_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/34.62613"},{"key":"e_1_3_2_1_2_2","unstructured":"D Blelchenbacher Addition chains for large sets Manuscript 1999 D Blelchenbacher Addition chains for large sets Manuscript 1999"},{"key":"e_1_3_2_1_3_2","first-page":"148","volume-title":"Proceedrags of ~.he 1998 IEEE Symposzum on Securzty and Pmvacy","author":"Davida I","year":"1998","unstructured":"( 3 I Davida , Y Frankel , and B J Matt On enabhng secure apphcatlons through off-line blometrtc identification. In Proceedrags of ~.he 1998 IEEE Symposzum on Securzty and Pmvacy , pages 148 - 157 , May 1998 (3 I Davida, Y Frankel, and B J Matt On enabhng secure apphcatlons through off-line blometrtc identification. In Proceedrags of ~.he 1998 IEEE Symposzum on Securzty and Pmvacy, pages 148-157, May 1998"},{"key":"e_1_3_2_1_4_2","unstructured":"D Feldmcier and P Karn UNIX password secumty--Ten years later In Advances ~n Cryptology--CRYPTO '89 Proceedings (Lecture Notes m Computer Scmnce 435) 1990 D Feldmcier and P Karn UNIX password secumty--Ten years later In Advances ~n Cryptology--CRYPTO '89 Proceedings (Lecture Notes m Computer Scmnce 435) 1990"},{"volume-title":"New York","year":"1979","author":"Garey M R","key":"e_1_3_2_1_5_2","unstructured":"M R Garey and D S Johnson Computers and Intractabd:ty A Guide to the Theory of NP-Completeness W H Freeman and Company , New York , 1979 . M R Garey and D S Johnson Computers and Intractabd:ty A Guide to the Theory of NP-Completeness W H Freeman and Company, New York, 1979."},{"volume-title":"aod N Shapiro Authentscarton by keystroke tzm~rtg. Some prelzmznary results Rand report R-256-NSF Rand Corporation","year":"1980","author":"Games R","key":"e_1_3_2_1_6_2","unstructured":"R Games , W Lmowski , S- Press , aod N Shapiro Authentscarton by keystroke tzm~rtg. Some prelzmznary results Rand report R-256-NSF Rand Corporation , 1980 R Games, W Lmowski, S- Press, aod N Shapiro Authentscarton by keystroke tzm~rtg. Some prelzmznary results Rand report R-256-NSF Rand Corporation, 1980"},{"key":"e_1_3_2_1_7_2","unstructured":"V Guruswaml and M Sudan Improved decoding of Reed- Solomon and algebraic-geometric codes In Proceedings of the 39th IEEE Symposium on Foundations of Computer Sczence pages 98-37 1998 V Guruswaml and M Sudan Improved decoding of Reed- Solomon and algebraic-geometric codes In Proceedings of the 39th IEEE Symposium on Foundations of Computer Sczence pages 98-37 1998"},{"key":"e_1_3_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00087-S"},{"key":"e_1_3_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"e_1_3_2_1_10_2","unstructured":"D Klein Foiling the cracker A survey of and improvements to password security In Proceedings of the 2~d USENIX Securtty Workshop August 1990 D Klein Foiling the cracker A survey of and improvements to password security In Proceedings of the 2~d USENIX Securtty Workshop August 1990"},{"key":"e_1_3_2_1_11_2","first-page":"1","volume-title":"Proceedings of the 4th USENIX Security Workshop","author":"Lacy J. B","year":"1993","unstructured":"J. B Lacy , D P MltchelI, and W M ScheIl~ CryptoLlb (jryptography in software In Proceedings of the 4th USENIX Security Workshop , pages 1 - 17 , October 1993 J. B Lacy, D P MltchelI, and W M ScheIl~ CryptoLlb (jryptography in software In Proceedings of the 4th USENIX Security Workshop, pages 1-17, October 1993"},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(91)90052-B"},{"issue":"6","key":"e_1_3_2_1_13_2","volume":"773","author":"Lennon R E","year":"1981","unstructured":"R E Lennon , S M Matyas , and C H Meyer Cryptographlc authentlcatmn of tlme-mvartant quantities 1 EEE Transactions on Communtcat~on~ COM-29 ( 6 ) 773-777 , June 1981 R E Lennon, S M Matyas, and C H Meyer Cryptographlc authentlcatmn of tlme-mvartant quantities 1EEE Transactions on Communtcat~on~ COM-29(6) 773-777, June 1981","journal-title":"EEE Transactions on Communtcat~on~ COM-29"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(88)80053-1"},{"key":"e_1_3_2_1_15_2","unstructured":"G Leggett J Williams and D Umphress Verification of user identtty v a keystroke charactermt~cs Human Factors m Management lnformat:on Systems 1989 G Leggett J Williams and D Umphress Verification of user identtty v a keystroke charactermt~cs Human Factors m Management lnformat:on Systems 1989"},{"issue":"2","key":"e_1_3_2_1_16_2","first-page":"171","volume":"15","author":"U Manber A","year":"1996","unstructured":"U Manber A simple scheme to make passwords based on oneway functions much harder to crack Computers ~ Security 15 ( 2 ) 171 - 176 , 1996 U Manber A simple scheme to make passwords based on oneway functions much harder to crack Computers ~ Security 15(2) 171-176, 1996","journal-title":"Security"},{"key":"e_1_3_2_1_17_2","unstructured":"J L Massey Guessing and entropy In Proceedings of the 199J IEEE Internatzonal Symposzum on Information Theory 1994 J L Massey Guessing and entropy In Proceedings of the 199J IEEE Internatzonal Symposzum on Information Theory 1994"},{"key":"e_1_3_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1061"},{"key":"e_1_3_2_1_19_2","unstructured":"A J Menezes P C van Oorschot and S A Vanstone Handbook of Apphed Cryptography CRC Press 1997 A J Menezes P C van Oorschot and S A Vanstone Handbook of Apphed Cryptography CRC Press 1997"},{"key":"e_1_3_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266434"},{"key":"e_1_3_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_22_2","unstructured":"K S Nash Rmmg laptop theft tacks on $150 a box Computer World August 3 1998 Avmlable at http\/\/www computerworld com\/home\/pr~nt nsf\/all\/gBo8035EO5 K S Nash Rmmg laptop theft tacks on $150 a box Computer World August 3 1998 Avmlable at http\/\/www computerworld com\/home\/pr~nt nsf\/all\/gBo8035EO5"},{"key":"e_1_3_2_1_23_2","doi-asserted-by":"crossref","unstructured":"R L Rivest Cryptography In Handbook o.f Theoretzcal Computer Science Chapter 13 pages 717-755 Elsevier Scmnce Pubhshers B V 1990 R L Rivest Cryptography In Handbook o.f Theoretzcal Computer Science Chapter 13 pages 717-755 Elsevier Scmnce Pubhshers B V 1990","DOI":"10.1016\/B978-0-444-88071-0.50018-7"},{"key":"e_1_3_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/3468.661150"},{"key":"e_1_3_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"volume-title":"U S Depaxtment of Commerce\/N I S T, Natmnal Techmcal lnformatmn Serwce","year":"1995","author":"FIPS","key":"e_1_3_2_1_26_2","unstructured":"FIPS 180-1 , Secure hash standard Federal Information Processmg Standards Publ,catmn 180-1 , U S Depaxtment of Commerce\/N I S T, Natmnal Techmcal lnformatmn Serwce , April 17, 1995 FIPS 180-1, Secure hash standard Federal Information Processmg Standards Publ,catmn 180-1, U S Depaxtment of Commerce\/N I S T, Natmnal Techmcal lnformatmn Serwce, April 17, 1995"},{"key":"e_1_3_2_1_27_2","unstructured":"E Spafford Observatmns on reusable password chmces In Proceedmgs of the 3~a USBNIX Secumty Symposzum September 1992 E Spafford Observatmns on reusable password chmces In Proceedmgs of the 3~a USBNIX Secumty Symposzum September 1992"},{"key":"e_1_3_2_1_28_2","doi-asserted-by":"crossref","unstructured":"D Umphress and G Wilhams Identity verificatmn through keyboard characteristms International Journal of Man-Mach=ne Studies 23(3} 263-273 1985 D Umphress and G Wilhams Identity verificatmn through keyboard characteristms International Journal of Man-Mach=ne Studies 23(3} 263-273 1985","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"e_1_3_2_1_29_2","unstructured":"T Wu A real-world analysm of Kerberos password security In Proceedings of the 1999 Network and D~str~buted System Secur:ty Sympos~ttm February 1999. T Wu A real-world analysm of Kerberos password security In Proceedings of the 1999 Network and D~str~buted System Secur:ty Sympos~ttm February 1999."}],"event":{"name":"CCS99: Sixth ACM Conference on Computer and Communication Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kent Ridge Digital Labs Singapore","acronym":"CCS99"},"container-title":["Proceedings of the 6th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/319709.319720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T23:41:59Z","timestamp":1672962119000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/319709.319720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,11]]},"references-count":29,"alternative-id":["10.1145\/319709.319720","10.1145\/319709"],"URL":"https:\/\/doi.org\/10.1145\/319709.319720","relation":{},"subject":[],"published":{"date-parts":[[1999,11]]},"assertion":[{"value":"1999-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}