{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期-部分”:[[2023,1,7]],“日期-时间”:“2023-01-07T05:52:56Z”,“时间戳”:1673070776470},“发布者位置”:“美国纽约州纽约市”,“引用-计数”:10,“发布商”:“ACM”,“内容-域”:[“dl.ACM.org”],“交叉标记-严格离子“:true},”短容器时间“:[],“published-print”:{“date-parts”:[[2013,11,4]]},“DOI”:“10.1145\/2517840.2517870”,“type”:“proceedings-article”,“created”:{“date-parts”:[2013,11,12]],“date-time”:“2013-11-12T15:29:36Z”,“timestamp”:1384270176000},《update-policy》:“http://\/dx.DOI.org\/10.1145\/crossmark-policy”,“source”:“Crossref”,“is-referenced-by-count”:2,“title”:[“密码分配问题”],“前缀”:“10.1145”,“作者”:[{“given”:“Rishab”,“family”:“Nithyanand”,“sequence”:“first”,“affiliation”:[}“name”:“Stony Brook University,Stony Broak,USA”}]},{“given”:“Rob”,”family“:”Johnson“,”sequence“:”additional“,”affiliance“[{”name“:”Stony Broek Universition,Stony布鲁克,USA”}]],“member”:“320“,”,“published-online”:{“date-parts”:[[2013,11,4]]},“reference”:[{“key”:“e_1_3_2_1_1_1”,“volume-title”:“Inc.”,“year”:“2010”},{“密钥”:“e_1_3_2_1”、“unstructured”:“安全办公室。www.databreaks.net\/category\/break-types\/exposition\/2013。安全办公室。www.databreaks.net\/category\/break-types\/exposit\/2013.“},{”key“:”e_1_3_2_1_1“,”volume-title“:”淡蓝色触摸纸“,”author“:”Bonneau J.“,“年份”:“2011”},“key”:“e_1_ 3_2_1_4_1”,“doi-asserted-by”:“publisher”,”doi“:”10.1145\/1242572.1242661“}”,{&Co.“,”author“:”Garey M.R.“,”year“:”1990“},{“key“:”e_1_3_2_1_6_1“,”doi断言“:”publisher“,”doi“:”10.1145\/113120.1143127“},{”key“:”e_1_3_2_1_7_1“,”卷标题“:”美国计算机应急准备小组“,”作者“:”Huth A.“,”年份“:”2012“},{”key“:”e_1_3_2_1_8_1“,”doi断言“:”publisher“,”doi“:”10.1145\/9758817.975820“},{”key“:”e_1_3_2_9_1“,“doi由”:“publisher”断言,“DOI“:”10.5555\/2032162.2032163“},{”key“:”e_1_3_2_10_1“,”DOI-asserted-by“:”publisher“,“DOI”:“10.5555\/314500.314921”}],“event”:{“name”:“CCS'13:2013 ACM SIGSAC Computer and Communications Security Conference”,“location”:“Berlin Germany”,“缩写词”:“CSS'13”,“赞助商”:[“SIGSAC ACM安全、审计和控制特别利益小组”]},“container-title“:[“第十二届ACM电子社会隐私研讨会论文集”],“original-title”:[],“link”:[{“URL”:“https:\/\/dl.ACM.org\/doi\/pdf\/10.1145\/2517840.2517870”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2023,1,6]],“date-time“:”2023-01-06T04:48:54Z“,”timestamp“:1672980534000},”score“:1,”resource“:{“primary”:{”URL“:”https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517870“}},“subtitle”:[“有效重用密码的策略”],“short title”:[],“issued”:{“date-parts”:[[2013,11,4]]}、“references-count”:10,“alternative-id”:[”10.1145\/2517840.2517870“,”10.1145\/2517840“],”URL“:”http://\/dx.doi.org\/10.1145\/25117840.2517870“,”关系“:{},”主题“:[],”发布“:{”日期部分“:[[2013,11,4]]},“断言”:[{”值“:”2013-11-04“,”顺序“:2,”名称“:”发布“,”标签“:”已发布“,“组”:{“名称”:“publication_history”,“标签”:“发布历史”}}]}}