{"id":"https://openalex.org/W2735903092","doi":"https://doi.org/10.23919/mipro.2017.7973619","title":"Resilience of students' passwords against attacks","display_name":"Resilience of students' passwords against attacks","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2735903092","doi":"https://doi.org/10.23919/mipro.2017.7973619","mag":"2735903092"},"language":"en","primary_location":{"id":"doi:10.23919/mipro.2017.7973619","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro.2017.7973619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009886320","display_name":"Bo\u0161tjan Brumen","orcid":"https://orcid.org/0000-0002-0560-1230"},"institutions":[{"id":"https://openalex.org/I37696226","display_name":"University of Maribor","ror":"https://ror.org/01d5jce07","country_code":"SI","type":"education","lineage":["https://openalex.org/I37696226"]}],"countries":["SI"],"is_corresponding":true,"raw_author_name":"Bostjan Brumen","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia","institution_ids":["https://openalex.org/I37696226"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065820543","display_name":"Tadej Makari","orcid":null},"institutions":[{"id":"https://openalex.org/I37696226","display_name":"University of Maribor","ror":"https://ror.org/01d5jce07","country_code":"SI","type":"education","lineage":["https://openalex.org/I37696226"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Tadej Makari","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia","institution_ids":["https://openalex.org/I37696226"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009886320"],"corresponding_institution_ids":["https://openalex.org/I37696226"],"apc_list":null,"apc_paid":null,"fwci":1.4509,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86694463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1275","last_page":"1279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9567999839782715,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9519945383071899},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.671629786491394},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6504048109054565},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6443077325820923},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.5920653343200684},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.562166154384613},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5450783371925354},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.5428751111030579},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.4763094186782837},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.44057410955429077},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.3732266426086426},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.224229097366333},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.21399778127670288},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.124423086643219}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9519945383071899},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.671629786491394},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6504048109054565},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6443077325820923},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.5920653343200684},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.562166154384613},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5450783371925354},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.5428751111030579},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.4763094186782837},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.44057410955429077},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.3732266426086426},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.224229097366333},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.21399778127670288},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.124423086643219},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mipro.2017.7973619","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro.2017.7973619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.550000011920929,"display_name":"Quality Education"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322554","display_name":"Javna Agencija za Raziskovalno Dejavnost RS","ror":"https://ror.org/059bp8k51"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W30702259","https://openalex.org/W94610818","https://openalex.org/W178526229","https://openalex.org/W1554853440","https://openalex.org/W1560225191","https://openalex.org/W1572182570","https://openalex.org/W1582097881","https://openalex.org/W1582830784","https://openalex.org/W2002093701","https://openalex.org/W2014373104","https://openalex.org/W2016605023","https://openalex.org/W2019130885","https://openalex.org/W2033128885","https://openalex.org/W2037202491","https://openalex.org/W2045119723","https://openalex.org/W2053030258","https://openalex.org/W2054157463","https://openalex.org/W2077711629","https://openalex.org/W2100783932","https://openalex.org/W2113266120","https://openalex.org/W2114037292","https://openalex.org/W2114525843","https://openalex.org/W2118075241","https://openalex.org/W2134080857","https://openalex.org/W2150341374","https://openalex.org/W2155410209","https://openalex.org/W2168164069","https://openalex.org/W2169901069","https://openalex.org/W2563714950","https://openalex.org/W4212778472","https://openalex.org/W4399339983","https://openalex.org/W6607222057","https://openalex.org/W6633398236"],"related_works":["https://openalex.org/W1982158666","https://openalex.org/W2969720675","https://openalex.org/W3131491961","https://openalex.org/W2596766976","https://openalex.org/W2017283799","https://openalex.org/W2953105088","https://openalex.org/W2596869006","https://openalex.org/W137322897","https://openalex.org/W2203557291","https://openalex.org/W72859687"],"abstract_inverted_index":{"Passwords":[0],"are":[1,100],"still":[2,149],"the":[3,26,31,105],"predominant":[4],"mode":[5],"of":[6,16,28,33,39,52,57,59,107,124],"authentication":[7,40],"in":[8,79,127,142],"contemporary":[9],"information":[10],"systems,":[11],"despite":[12,146],"a":[13,75,83,133,162],"long":[14,85],"list":[15],"problems":[17],"associated":[18],"with":[19],"their":[20,62],"insecurity.":[21],"Their":[22],"primary":[23],"advantage":[24],"is":[25,110,172],"ease":[27],"use":[29],"and":[30,61,67],"price":[32],"implementation,":[34],"compared":[35],"to":[36,103,152,158,168],"other":[37],"systems":[38,171],"(e.g.":[41],"two-factor,":[42],"biometry,":[43],"...).":[44],"In":[45],"this":[46],"paper":[47],"we":[48],"present":[49],"an":[50],"analysis":[51],"passwords":[53,71,89,99,109,125],"used":[54],"by":[55],"students":[56],"one":[58],"universities":[60],"resilience":[63],"against":[64],"brute":[65],"force":[66],"dictionary":[68],"attacks.":[69],"The":[70,94,136],"were":[72,90,129],"obtained":[73],"from":[74,164],"university's":[76],"computing":[77],"center":[78],"plaintext":[80],"format":[81],"for":[82,114],"very":[84],"period":[86],"-":[87,141],"first":[88],"created":[91,116,126],"before":[92,117],"1980.":[93],"results":[95,137],"show":[96,138],"that":[97,139,161],"early":[98],"extremely":[101],"easy":[102,151],"crack:":[104],"percentage":[106],"cracked":[108],"above":[111],"95":[112],"%":[113,123],"those":[115],"2006.":[118],"Surprisingly,":[119],"more":[120,169],"than":[121],"40":[122],"2014":[128],"easily":[130],"broken":[131],"within":[132],"few":[134],"hours.":[135],"users":[140],"our":[143],"case":[144],"students,":[145],"positive":[147],"trends,":[148],"choose":[150],"break":[153],"passwords.":[154],"This":[155],"work":[156],"contributes":[157],"loud":[159],"warnings":[160],"shift":[163],"traditional":[165],"password":[166],"schemes":[167],"elaborate":[170],"needed.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
