{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:25:22Z","timestamp":1750998322066,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030397487"},{"type":"electronic","value":"9783030397494"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39749-4_9","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T18:03:07Z","timestamp":1579888987000},"page":"138-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Federico","family":"Sinigaglia","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Carbone","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1007\/978-3-642-38631-2_63","volume-title":"Network and System Security","author":"A Armando","year":"2013","unstructured":"Armando, A., Carbone, R., Zanetti, L.: Formal modeling and automatic security analysis of two-factor and two-channel authentication protocols. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 728\u2013734. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38631-2_63"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Cristofaro, E.D., Du, H., Freudiger, J., Norcie, G.: Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication. CoRR abs\/1309.5344. University College London (2013)","DOI":"10.14722\/usec.2014.23025"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2011.144","volume":"9","author":"D DeFigueiredo","year":"2011","unstructured":"DeFigueiredo, D.: The case for mobile two-factor authentication. IEEE Secur. Priv. 9, 81\u201385 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR4","unstructured":"European Banking Authority: Recommendations for the Security of Internet Payments (2013). https:\/\/www.ecb.europa.eu\/pub\/pdf\/other\/recommendationssecurityinternetpaymentsoutcomeofpcfinalversionafterpc201301en.pdf"},{"key":"9_CR5","unstructured":"European Banking Authority: Recommendations for the Security of Mobile Payments - DRAFT (2013). https:\/\/www.ecb.europa.eu\/paym\/cons\/pdf\/131120\/recommendationsforthesecurityofmobilepaymentsdraftpc201311en.pdf"},{"key":"9_CR6","unstructured":"European Banking Authority: Directive 2015\/2366 of the European Parliament and of the Council on payment services in the internal market (PSD2) (2015). https:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX:32015L2366"},{"key":"9_CR7","unstructured":"European Banking Authority: Regulatory Technical Standards on Strong Customer Authentication and common and secure communication under Article 98 of PSD2 (2017). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32018R0389&from=EN"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Furst, K., Lang, W.W., Nolle, D.E.: Internet banking: Developments and prospects. Economic and Policy Analysis Working Paper No. 2000-9, Office of the Comptroller of the Currency (2000)","DOI":"10.2139\/ssrn.1988503"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-31284-7_1","volume-title":"Applied Cryptography and Network Security","author":"F Hao","year":"2012","unstructured":"Hao, F., Clarke, D.: Security analysis of a multi-factor authenticated key exchange protocol. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 1\u201311. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31284-7_1"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.clsr.2015.12.004","volume":"32","author":"E Kennedy","year":"2016","unstructured":"Kennedy, E., Millard, C.: Data security and multi-factor authentication: analysis of requirements under EU law and in selected EU Member States. Comput. Law Secur. Rev. 32, 91\u2013110 (2016)","journal-title":"Comput. Law Secur. Rev."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Krol, K., Philippou, E., Cristofaro, E.D., Sasse, M.A.: \u201cThey brought in the horrible key ring thing!\u201d Analysing the Usability of Two-Factor Authentication in UK Online Banking. CoRR abs\/1501.04434. University College London (2015)","DOI":"10.14722\/usec.2015.23001"},{"key":"9_CR12","unstructured":"NIST: Special Publication - Digital Identity Guidelines (2017). https:\/\/pages.nist.gov\/800-63-3\/"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-319-89722-6_8","volume-title":"Principles of Security and Trust","author":"G Sciarretta","year":"2018","unstructured":"Sciarretta, G., Carbone, R., Ranise, S., Vigan\u00f2, L.: Design, formal specification and analysis of multi-factor authentication solutions with a single sign-on experience. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 188\u2013213. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_8"},{"issue":"3","key":"9_CR14","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.intcom.2009.10.001","volume":"22","author":"CS Weir","year":"2010","unstructured":"Weir, C.S., Douglas, G., Richardson, T., Jack, M.: Usable security: user preferences for authentication methods in eBanking and the effects of experience. Interact. Comput. 22(3), 153\u2013164 (2010)","journal-title":"Interact. Comput."}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39749-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T23:03:29Z","timestamp":1737673409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-39749-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030397487","9783030397494"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39749-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iit.cnr.it\/etaa2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}