{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T23:22:51Z","timestamp":1709680971179},"reference-count":20,"publisher":"Hindawi Limited","issue":"11","license":[{"start":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T00:00:00Z","timestamp":1657497600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T00:00:00Z","timestamp":1657497600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672330"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1002\/int.22959","type":"journal-article","created":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T10:34:58Z","timestamp":1657535698000},"page":"8635-8652","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Understanding digit\u2010only financial account passwords: ID card, structure, and security"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5385-4013","authenticated-orcid":false,"given":"Hongfang","family":"Shi","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, School of Information Science and Engineering Shandong Normal University Jinan China"}]},{"given":"Wenying","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, School of Information Science and Engineering Shandong Normal University Jinan China"}]},{"given":"Zimin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, School of Information Science and Engineering Shandong Normal University Jinan China"}]},{"given":"Dewen","family":"Ding","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, School of Information Science and Engineering Shandong Normal University Jinan China"}]},{"given":"Huimin","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, School of Information Science and Engineering Shandong Normal University Jinan China"}]},{"given":"Hong","family":"Lei","sequence":"additional","affiliation":[{"name":"Department of Mathmatics Dongying Vocational College Donngying China"}]}],"member":"98","published-online":{"date-parts":[[2022,7,11]]},"reference":[{"key":"e_1_2_9_2_1","first-page":"1537","volume-title":"USENIX Security Symposium","author":"Wang D","year":"2019"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.064"},{"issue":"3","key":"e_1_2_9_4_1","first-page":"1","article-title":"Network security situation assessment with network attack behavior classification","volume":"37","author":"Yang H","year":"2022","journal-title":"Int J Intell Syst"},{"issue":"1","key":"e_1_2_9_5_1","first-page":"1","article-title":"Privacy\u2010preserving federated learning based on multi\u2010key homomorphic encryption","volume":"37","author":"Ma J","year":"2022","journal-title":"Int J Intell Syst"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"McCallisterE GranceT ScarfoneK.\u00a0NIST SP800\u2010122: Guide to protecting the Confidentiality of Personally Identifiable Information (PII).\u00a0Technical Report.\u00a0NIST;\u00a02010.","DOI":"10.6028\/NIST.SP.800-122"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2490620"},{"key":"e_1_2_9_8_1","doi-asserted-by":"crossref","unstructured":"LiY WangH SunK. A study of personal information in human\u2010chosen passwords and its security implications.IEEE International Conference on Computer Communications. IEEE;2016:1\u20109.","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2481884"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_23"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2568187"},{"key":"e_1_2_9_13_1","doi-asserted-by":"crossref","unstructured":"BiryukovA WagnerDA. Slide attacks.International Workshop on Fast Software Encryption. Springer;1999:\u200b245\u2010259.","DOI":"10.1007\/3-540-48519-8_18"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737971"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.046"},{"key":"e_1_2_9_17_1","unstructured":"BellareM RogawayP SpiesT.The FFX mode of operation for format\u2010preserving encryption.NIST submission.2010;20(19):1\u201018."},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"e_1_2_9_19_1","doi-asserted-by":"crossref","unstructured":"YanH ChenM HuL JiaC.Secure video retrieval using image query on an untrusted cloud.Appl Soft Comput.2020;97(6):1\u201016.doi:10.1016\/j.asoc.2020.106782","DOI":"10.1016\/j.asoc.2020.106782"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01242-z"},{"key":"e_1_2_9_21_1","doi-asserted-by":"crossref","unstructured":"HuangT ZhangQ LiuJ HouR WangX LiYa.Adversarial attacks on deep\u2010learning\u2010based SAR image _target recognition.J Network Comput Appl.2020;162(7):1\u201012.doi:10.1016\/j.jnca.2020.102632.2020","DOI":"10.1016\/j.jnca.2020.102632"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22959","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22959","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:32:42Z","timestamp":1675956762000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,11]]},"references-count":20,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["10.1002\/int.22959"],"URL":"https:\/\/doi.org\/10.1002\/int.22959","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,11]]},"assertion":[{"value":"2022-01-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}