{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:19:48Z","timestamp":1758273588551,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030518271"},{"type":"electronic","value":"9783030518288"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51828-8_25","type":"book-chapter","created":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:35:50Z","timestamp":1593563750000},"page":"189-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Easy Identity Management and Enhanced Security in Account Linking"],"prefix":"10.1007","author":[{"given":"Dahey","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Jin","family":"Ra","sequence":"additional","affiliation":[]},{"given":"Bora","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,1]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Safaei, B., Monazzah, A.M.H., Bafroei, M.B., Ejlali, A.: Reliability side-effects in internet of things application layer protocols. In: 2nd International Conference on System Reliability and Safety (ICSRS), pp. 207\u2013212. IEEE (2017)","DOI":"10.1109\/ICSRS.2017.8272822"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Oh, S., Yoo, H., Jeong, D.R., Bui, D.H., Shin, I.: Mobile plus: multi-device mobile platform for cross-device functionality sharing. In: 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 332\u2013344. ACM (2017)","DOI":"10.1145\/3081333.3081348"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Braz, C., Seffah, A., M\u2019Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: IFID Conference on Human-Computer Interaction (INTERACT), pp. 114\u2013126. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74800-7_9"},{"key":"25_CR4","unstructured":"Understanding User Authentication: 3 Basics You Should Know. https:\/\/swoopnow.com\/user-authentication\/. Accessed 31 Jan 2020"},{"key":"25_CR5","unstructured":"Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: 9th Workshop on the Economics of Information Security (WEIS) (2010)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Wijayarathna, C., Arachchilage, N.A.G.: An empirical usability analysis of the google authentication API. In: Evaluation and Assessment on Software Engineering (EASE), pp. 268\u2013274. Association for Computing Machinery (2019)","DOI":"10.1145\/3319008.3319350"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Teng, Z., Zhang, P., Li, X., Nock, W., Rodriguez-Cancio, M., White, J., Schmidt, D. C., Gilmore, D., Nesbitt, J.C.: Authentication and usability in mHealth apps. In: 20th IEEE International Conference on e-Health Networking, Applications and Services (Healthcom). IEEE (2018)","DOI":"10.1109\/HealthCom.2018.8531158"},{"issue":"1","key":"25_CR8","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MIC.2012.11","volume":"16","author":"B Leiba","year":"2012","unstructured":"Leiba, B.: Oauth web authorization protocol. J. IEEE Internet Comput. 16(1), 74\u201377 (2012)","journal-title":"J. IEEE Internet Comput."},{"key":"25_CR9","unstructured":"Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., Seamons, K.: A usability study of five two-factor authentication methods. In: 15th Symposium on Usable Privacy and Security, pp. 357\u2013370. USENIX (2019)"},{"issue":"1","key":"25_CR10","first-page":"1141","volume":"62","author":"CZ Acemyan","year":"2018","unstructured":"Acemyan, C.Z., Kortum, P., Xiong, J., Wallach, D.S.: 2FA might be secure, but it\u2019s not usable: a summative usability assessment of google\u2019s two-factor authentication (2FA) methods. Hum. Fact. Ergon. Soc. Ann. Meet. 62(1), 1141\u20131145 (2018)","journal-title":"Hum. Fact. Ergon. Soc. Ann. Meet."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Usability, User Experience, Wearable and Assistive Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51828-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T07:11:21Z","timestamp":1614064281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-51828-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030518271","9783030518288"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51828-8_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ahfe2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}