{"id":"https://openalex.org/W2512638640","doi":"https://doi.org/10.1145/2905055.2905128","title":"A Novel Approach towards Authentication by Generating Strong Passwords","display_name":"A Novel Approach towards Authentication by Generating Strong Passwords","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2512638640","doi":"https://doi.org/10.1145/2905055.2905128","mag":"2512638640"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905128","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074569483","display_name":"Vijay B. Gadicha","orcid":"https://orcid.org/0000-0002-7497-2289"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vijay B. Gadicha","raw_affiliation_strings":["P.R.Patil College of Engineering &amp; Management, Amravati"],"affiliations":[{"raw_affiliation_string":"P.R.Patil College of Engineering &amp; Management, Amravati","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085134308","display_name":"A. S. Alvi","orcid":"https://orcid.org/0000-0003-0041-9242"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. S. Alvi","raw_affiliation_strings":["Ram Meghe Institute of Technology &amp; Research, Badnera, Amravati"],"affiliations":[{"raw_affiliation_string":"Ram Meghe Institute of Technology &amp; Research, Badnera, Amravati","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074569483"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10923381,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9478152990341187},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8010369539260864},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6398375630378723},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6189736723899841},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6183636784553528},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.5899468660354614},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.5416702628135681},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.523055374622345},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4975426495075226},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4759747087955475},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.4745108485221863},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.4424445331096649},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09810703992843628}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9478152990341187},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8010369539260864},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6398375630378723},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6189736723899841},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6183636784553528},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.5899468660354614},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.5416702628135681},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.523055374622345},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4975426495075226},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4759747087955475},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.4745108485221863},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.4424445331096649},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09810703992843628}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905128","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1979875096","https://openalex.org/W1982308847","https://openalex.org/W1997942468","https://openalex.org/W2021337165","https://openalex.org/W2024819546","https://openalex.org/W2052480010","https://openalex.org/W2138835393","https://openalex.org/W2149336128"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W1982158666","https://openalex.org/W3131491961","https://openalex.org/W2953105088","https://openalex.org/W2596766976","https://openalex.org/W4302810031","https://openalex.org/W2916013051","https://openalex.org/W2017283799","https://openalex.org/W1847856596","https://openalex.org/W4294993944"],"abstract_inverted_index":{"Usually":[0],"now":[1],"a":[2,8,38,88,92],"day's":[3],"passwords":[4,26],"are":[5,28,79],"used":[6,126],"as":[7],"vehicle":[9],"to":[10,16,46,71,90],"achieve":[11],"Authentication,":[12],"validation":[13],"&":[14,98],"Verification":[15],"work":[17],"on":[18,37,129],"many":[19],"software":[20,131],"applications.":[21],"But":[22],"majority":[23],"of":[24,63,118],"the":[25,41,61,64,72,109,115,119],"which":[27,85,104],"assigned":[29],"by":[30,34,44,108],"humans":[31],"or":[32],"generated":[33,107],"machines":[35],"works":[36],"assumption":[39],"that":[40,49],"password":[42,94,103,121],"should":[43],"easy":[45],"remember":[47],"so":[48],"it":[50,124],"will":[51,86,105,112,125],"be":[52,106],"recollected":[53],"when":[54],"and":[55,67,122],"where":[56],"required.":[57],"This":[58],"ultimately":[59],"brings":[60],"downfall":[62],"system":[65,89,111],"security":[66],"also":[68],"provides":[69],"challenge":[70],"authentication.":[73],"Therefore":[74],"in":[75],"this":[76],"paper":[77],"we":[78],"coming":[80],"up":[81],"with":[82],"an":[83],"idea":[84],"propose":[87],"generate":[91],"strong":[93,120],"using":[95],"image":[96],"fusion":[97],"multi-shared":[99],"visual":[100],"cryptography.":[101],"The":[102],"proposed":[110],"pass":[113],"through":[114],"definition":[116],"filter":[117],"then":[123],"for":[127],"working":[128],"various":[130],"applications":[132]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
