{"id":"https://openalex.org/W1491147638","doi":"https://doi.org/10.1109/mipro.2015.7160486","title":"Moore's curse on textual passwords","display_name":"Moore's curse on textual passwords","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1491147638","doi":"https://doi.org/10.1109/mipro.2015.7160486","mag":"1491147638"},"language":"en","primary_location":{"id":"doi:10.1109/mipro.2015.7160486","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2015.7160486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009886320","display_name":"Bo\u0161tjan Brumen","orcid":"https://orcid.org/0000-0002-0560-1230"},"institutions":[{"id":"https://openalex.org/I37696226","display_name":"University of Maribor","ror":"https://ror.org/01d5jce07","country_code":"SI","type":"education","lineage":["https://openalex.org/I37696226"]}],"countries":["SI"],"is_corresponding":true,"raw_author_name":"Bostjan Brumen","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia","University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, Si-2000, Slovenia"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia","institution_ids":["https://openalex.org/I37696226"]},{"raw_affiliation_string":"University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, Si-2000, Slovenia","institution_ids":["https://openalex.org/I37696226"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038770060","display_name":"Viktor Taneski","orcid":"https://orcid.org/0000-0001-5841-9275"},"institutions":[{"id":"https://openalex.org/I37696226","display_name":"University of Maribor","ror":"https://ror.org/01d5jce07","country_code":"SI","type":"education","lineage":["https://openalex.org/I37696226"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Viktor Taneski","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia","University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, Si-2000, Slovenia"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia","institution_ids":["https://openalex.org/I37696226"]},{"raw_affiliation_string":"University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, Si-2000, Slovenia","institution_ids":["https://openalex.org/I37696226"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009886320"],"corresponding_institution_ids":["https://openalex.org/I37696226"],"apc_list":null,"apc_paid":null,"fwci":1.5892,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86820562,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1360","last_page":"1365"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9471805691719055},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.7291643619537354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7245923280715942},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.683681070804596},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.629684567451477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6276341080665588},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5253117680549622},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.44055646657943726},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.38079944252967834},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34114938974380493}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9471805691719055},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.7291643619537354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7245923280715942},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.683681070804596},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.629684567451477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6276341080665588},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5253117680549622},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.44055646657943726},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.38079944252967834},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34114938974380493}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mipro.2015.7160486","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2015.7160486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W89288782","https://openalex.org/W117099319","https://openalex.org/W178526229","https://openalex.org/W1487941708","https://openalex.org/W1503108337","https://openalex.org/W1516422083","https://openalex.org/W1548067747","https://openalex.org/W1570656631","https://openalex.org/W1572182570","https://openalex.org/W1582097881","https://openalex.org/W1582830784","https://openalex.org/W1723455574","https://openalex.org/W1964228164","https://openalex.org/W1969125196","https://openalex.org/W1975593192","https://openalex.org/W1976421215","https://openalex.org/W1984314602","https://openalex.org/W1994504386","https://openalex.org/W2009829087","https://openalex.org/W2016605023","https://openalex.org/W2025516544","https://openalex.org/W2036740346","https://openalex.org/W2037202491","https://openalex.org/W2042206148","https://openalex.org/W2044316729","https://openalex.org/W2048705589","https://openalex.org/W2058994620","https://openalex.org/W2064327548","https://openalex.org/W2066345778","https://openalex.org/W2100783932","https://openalex.org/W2121386924","https://openalex.org/W2124686424","https://openalex.org/W2134080857","https://openalex.org/W2148987260","https://openalex.org/W2149929743","https://openalex.org/W2150010995","https://openalex.org/W2152914186","https://openalex.org/W2161032904","https://openalex.org/W2163845236","https://openalex.org/W2168416519","https://openalex.org/W2171920515","https://openalex.org/W2344562577","https://openalex.org/W2408452766","https://openalex.org/W2579555219","https://openalex.org/W3037853801","https://openalex.org/W3203992401","https://openalex.org/W4285719527","https://openalex.org/W6603567712","https://openalex.org/W6630133823","https://openalex.org/W6633923764","https://openalex.org/W6656594533","https://openalex.org/W6683498256","https://openalex.org/W6714061215"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2596766976","https://openalex.org/W2017283799","https://openalex.org/W2021087413","https://openalex.org/W2953105088","https://openalex.org/W2182949018","https://openalex.org/W1978329066","https://openalex.org/W4299928509","https://openalex.org/W2743151892","https://openalex.org/W1571454820"],"abstract_inverted_index":{"Background:":[0],"Passwords":[1],"are":[2,13,128,247],"still":[3],"the":[4,48,71,88,103,105,131,140,159,167,189,198,212,218,234,250,257],"predominant":[5],"way":[6],"of":[7,28,94,102,126,226,233],"authentication":[8],"in":[9,87,118,166,182,202,256],"information":[10],"systems,":[11],"and":[12,23,32,54,78,112,124,139,156,192,253],"mostly":[14],"at":[15,33],"user's":[16,49],"responsibility.":[17],"They":[18],"conceive,":[19],"use,":[20],"re-use,":[21],"abuse":[22],"forget":[24],"passwords.":[25],"In":[26,115],"absence":[27],"strict":[29],"password":[30,137,200,206,221],"policies":[31],"minimum":[34,199,219],"required":[35,142,220],"user":[36],"training,":[37],"passwords":[38,63,77,111,235,246,262],"tend":[39],"to":[40,44,47,57,75,98,143,164,171,238,265],"be":[41,85,165,225,266],"short,":[42],"easy":[43,56],"remember,":[45],"connected":[46],"personal":[50],"or":[51],"professional":[52],"life":[53],"consequently":[55],"break.":[58],"The":[59,92,149,195,243],"additional":[60],"problem":[61],"with":[62,173],"is":[64,69,97,108],"their":[65,113,239],"aging:":[66],"Moore's":[67,106,160,251],"law":[68,107,161,252],"affecting":[70],"available":[72],"computing":[73,123,177],"power":[74],"crack":[76],"those":[79],"deemed":[80],"secure":[81],"today":[82,223],"may":[83],"easily":[84],"broken":[86],"near":[89],"future.":[90],"Objective:":[91],"aim":[93],"this":[95],"paper":[96,196],"study":[99],"various":[100,136,154,209],"scenarios":[101,155],"effect":[104,168],"having":[109],"on":[110],"security.":[114],"addition,":[116],"advancements":[117,255],"other":[119,254,269],"fields,":[120],"e.g.":[121],"quantum":[122,176],"Internet":[125],"Things,":[127],"taken":[129],"into":[130],"account.":[132],"Method:":[133],"We":[134],"analyzed":[135],"types":[138],"lengths":[141],"withstand":[144],"an":[145],"off-line":[146],"brute-force":[147],"attack.":[148],"analysis":[150],"was":[151],"performed":[152],"under":[153,208],"combinations":[157],"thereof:":[158],"will":[162,178,186,263],"continue":[163],"for":[169,204],"years":[170],"come":[172],"varying":[174],"parameters,":[175],"become":[179],"feasible,":[180],"improvements":[181],"hash":[183],"tables":[184],"computations":[185],"speed":[187],"up":[188],"cracking":[190],"process,":[191],"others.":[193],"Results:":[194],"shows":[197,216],"length":[201,222],"characters":[203],"each":[205],"type":[207],"scenarios.":[210],"Even":[211],"most":[213,232],"optimistic":[214],"scenario":[215],"that":[217],"should":[224],"11":[227],"randomly":[228],"drawn":[229],"characters,":[230],"rendering":[231],"inappropriate":[236],"due":[237],"poor":[240],"memorability.":[241],"Conclusion:":[242],"current":[244],"textual":[245,261],"cursed":[248],"by":[249,268],"field.":[258],"Soon,":[259],"classical":[260],"need":[264],"replaced":[267],"mechanisms,":[270],"which":[271],"are,":[272],"fortunately,":[273],"already":[274],"emerging.":[275]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
