{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.19410","arxiv_id":"2604.19410","integrity":{"available":true,"endpoint":"/pith/2604.19410/integrity.json","summary":{"critical":0,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":2,"critical":0,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-20T03:01:35.756614Z","findings_count":2}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3491102.3517531/SUPPL_FILE/3491102.3517531-VIDEO-PREVIEW.MP4) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3491102.3517531/SUPPL_FILE/3491102.3517531-VIDEO-PREVIEW.MP4","detected_arxiv_id":null,"ref_index":3,"audited_at":"2026-05-20T03:01:35.756614Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1866307.1866328;wgroup:string:acmETRA) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/1866307.1866328;wgroup:string:acmETRA","detected_arxiv_id":null,"ref_index":44,"audited_at":"2026-05-20T03:01:35.756614Z"}],"snapshot_sha256":"694b5d4efcf618c481fe84248650202829e999eefab8185b7be706f02061a583"},"events":[{"event_id":4460,"event_type":"pith.integrity.v1","payload_sha256":"6e455e584bb667f09c14caed9b7eed16125119df610a251f63959bde147b0c24","signature_b64":"PEcvGWcwv5Lg1GwdQdtljC/9MPIFAa0hyOLGmumULdX5X0G2wwD0UnAY58NGfl29blfKNlD6K4nIpcDe4O7OBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T03:02:40.294148+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1866307.1866328;wgroup:string:acmETRA) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. 2010. The security of modern password expiration: An algorithmic framework and empirical analysis. Proceedings of the ACM Conference on Computer and Communications Security (2010), 176–1","arxiv_id":"2604.19410","detector":"doi_compliance","evidence":{"ref_index":44,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. 2010. The security of modern password expiration: An algorithmic framework and empirical analysis. Proceedings of the ACM Conference on Computer and Communications Security (2010), 176–1","reconstructed_doi":"10.1145/1866307.1866328;wgroup:string:acmETRA"},"severity":"advisory","ref_index":44,"audited_at":"2026-05-20T03:01:35.756614Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/1866307.1866328;wgroup:string:acmETRA","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"a5746823aaf86270635bb8896cf67a810988d91d77d70f1bfec0d24278f4b995","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":4459,"event_type":"pith.integrity.v1","payload_sha256":"1cf7305f3fbbbbe36d5e21c782d4c8cd201a6f62d5f9f0abe4ef0f76d5c8eea1","signature_b64":"xxGNwxvByIhHuR1foaMieYcn6UXlL47o7VewQD27bjRrs1zqX6ZUt5XCafjo5Th+9G3mF8BV0P/lyz3iZGWFCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-20T03:02:40.290538+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3491102.3517531/SUPPL_FILE/3491102.3517531-VIDEO-PREVIEW.MP4) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Yasmeen Abdrabou, Johannes Schütte, Ahmed Shams, Ken Pfeuffer, Daniel Buschek, Mohamed Khamis, and Florian Alt. 2022. \"Your Eyes Tell You Have Used This Password Before\": Identifying Password Reuse from Gaze and Keystroke Dynamics.Conferenc","arxiv_id":"2604.19410","detector":"doi_compliance","evidence":{"ref_index":3,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Yasmeen Abdrabou, Johannes Schütte, Ahmed Shams, Ken Pfeuffer, Daniel Buschek, Mohamed Khamis, and Florian Alt. 2022. \"Your Eyes Tell You Have Used This Password Before\": Identifying Password Reuse from Gaze and Keystroke Dynamics.Conferenc","reconstructed_doi":"10.1145/3491102.3517531/SUPPL_FILE/3491102.3517531-VIDEO-PREVIEW.MP4"},"severity":"advisory","ref_index":3,"audited_at":"2026-05-20T03:01:35.756614Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3491102.3517531/SUPPL_FILE/3491102.3517531-VIDEO-PREVIEW.MP4","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"77c91ee6340fb79eb06819bd27a7717b579b01ba95461c27dcd56ea298195e2a","paper_version":2,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.19410/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}