{"id":"https://openalex.org/W2207835792","doi":"https://doi.org/10.1007/978-3-319-10879-7_13","title":"Statistics on Password Re-use and Adaptive Strength for Financial Accounts","display_name":"Statistics on Password Re-use and Adaptive Strength for Financial Accounts","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2207835792","doi":"https://doi.org/10.1007/978-3-319-10879-7_13","mag":"2207835792"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-10879-7_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-10879-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024197927","display_name":"Daniel V. Bailey","orcid":"https://orcid.org/0009-0002-4749-6448"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Daniel V. Bailey","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Bochum, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110236021","display_name":"Markus D\u00fcrmuth","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Markus D\u00fcrmuth","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Bochum, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041748332","display_name":"Christof Paar","orcid":"https://orcid.org/0000-0001-8681-2277"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christof Paar","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Bochum, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024197927"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.7397,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.953628,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"218","last_page":"235"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12553","display_name":"Psychedelics and Drug Studies","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9696999788284302,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9769821763038635},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.7358274459838867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7315255999565125},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.7057475447654724},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.5816254615783691},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5653517246246338},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4334176778793335},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4318586587905884},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4240309000015259},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.3369101285934448},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18620502948760986},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.06387072801589966}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9769821763038635},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.7358274459838867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7315255999565125},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.7057475447654724},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.5816254615783691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5653517246246338},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4334176778793335},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4318586587905884},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4240309000015259},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.3369101285934448},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18620502948760986},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.06387072801589966}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-10879-7_13","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-10879-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W167157979","https://openalex.org/W563958770","https://openalex.org/W1483547755","https://openalex.org/W1566273181","https://openalex.org/W1582830784","https://openalex.org/W1921097329","https://openalex.org/W2025448348","https://openalex.org/W2048755632","https://openalex.org/W2054626033","https://openalex.org/W2066345778","https://openalex.org/W2086553822","https://openalex.org/W2091833612","https://openalex.org/W2091939813","https://openalex.org/W2097267243","https://openalex.org/W2104773223","https://openalex.org/W2113266120","https://openalex.org/W2119545418","https://openalex.org/W2123097583","https://openalex.org/W2135359429","https://openalex.org/W2149929743","https://openalex.org/W2159510087","https://openalex.org/W2167841397","https://openalex.org/W2171920515","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2047210152","https://openalex.org/W2359085393","https://openalex.org/W1844709308","https://openalex.org/W4283835082","https://openalex.org/W2565480008","https://openalex.org/W2079990687","https://openalex.org/W2185274381","https://openalex.org/W2993348482","https://openalex.org/W2049404317"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
