{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:07:39Z","timestamp":1755839259143,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030937461"},{"type":"electronic","value":"9783030937478"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93747-8_2","type":"book-chapter","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T06:08:47Z","timestamp":1642054127000},"page":"17-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3122-7315","authenticated-orcid":false,"given":"Florentin","family":"Putz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2623-5989","authenticated-orcid":false,"given":"Steffen","family":"Sch\u00f6n","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9163-5989","authenticated-orcid":false,"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"2_CR1","unstructured":"Ciolino, S., Parkin, S., Dunphy, P.: Of two minds about two-factor: understanding everyday FIDO U2F usability through device comparison and experience sampling. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 339\u2013356. USENIX Association, Santa Clara, August 2019"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280, RFC Editor, May 2008. http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2. RFC 5246, RFC Editor, August 2008. http:\/\/www.rfc-editor.org\/rfc\/rfc5246.txt","DOI":"10.17487\/rfc5246"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Transport layer security (TLS) extensions: Extension definitions. RFC 6066, RFC Editor, January 2011. http:\/\/www.rfc-editor.org\/rfc\/rfc6066.txt","DOI":"10.17487\/rfc6066"},{"key":"2_CR5","unstructured":"Farke, F.M., Lorenz, L., Schnitzler, T., Markert, P., D\u00fcrmuth, M.: \u201cYou still use the password after all\" \u2013 exploring FIDO2 security keys in a small company. In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), pp. 19\u201335. USENIX Association, August 2020"},{"key":"2_CR6","unstructured":"FIDO Alliance: Client to authenticator protocol (CTAP), June 2021. https:\/\/fidoalliance.org\/specs\/fido-v2.1-ps-20210615\/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html"},{"key":"2_CR7","unstructured":"FIDO Alliance: FIDO U2F raw message formats, April 2017. https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-raw-message-formats-v1.2-ps-20170411.html"},{"key":"2_CR8","unstructured":"FIDO Alliance: FIDO2: Moving the world beyond passwords using WebAuthn & CTAP, June 2020. https:\/\/fidoalliance.org\/fido2"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Frymann, N., Gardham, D., Kiefer, F., Lundberg, E., Manulis, M., Nilsson, D.: Asynchronous remote key generation: an analysis of Yubico\u2019s proposal for W3C WebAuthn. Association for Computing Machinery, New York, October 2020. https:\/\/doi.org\/10.1145\/3372297.3417292","DOI":"10.1145\/3372297.3417292"},{"key":"2_CR10","unstructured":"Google: OpenSK. https:\/\/github.com\/google\/OpenSK (2020)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Hodges, J., Mandyam, G., Jones, M.B.: RFC 8809: Registries for web authentication (WebAuthn). RFC 8809, RFC Editor, August 2020. https:\/\/www.rfc-editor.org\/rfc\/rfc8809.txt","DOI":"10.17487\/RFC8809"},{"key":"2_CR12","unstructured":"IANA: Web authentication (WebAuthn) registries, August 2020. https:\/\/www.iana.org\/assignments\/webauthn\/webauthn.xhtml"},{"key":"2_CR13","unstructured":"Kreichgauer, M.: Intent to deprecate and remove: U2F API (cryptotoken)(2021). https:\/\/groups.google.com\/a\/chromium.org\/g\/blink-dev\/c\/xHC3AtU_65A"},{"key":"2_CR14","unstructured":"Langley, A.: Re: issue 1097972: support WebAuthn uvi & uvm extension, June 2020. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=1097972#c3"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Lyastani, S.G., Schilling, M., Neumayr, M., Backes, M., Bugiel, S.: Is FIDO2 the Kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 842\u2013859. IEEE Computer Society, May 2020. https:\/\/doi.org\/10.1109\/SP40000.2020.00047","DOI":"10.1109\/SP40000.2020.00047"},{"key":"2_CR16","unstructured":"MDN: Web authentication API. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Web_Authentication_API (2021)"},{"key":"2_CR17","unstructured":"MDN: Web authentication API: Browser compatibility, March 2021. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/Web_Authentication_API#Browser_compatibility"},{"key":"2_CR18","unstructured":"Microsoft: Win32 headers for WebAuthn (2021). https:\/\/github.com\/microsoft\/webauthn"},{"key":"2_CR19","unstructured":"Mooney, N.: Addition of a network transport (2020). https:\/\/github.com\/w3c\/webauthn\/issues\/1381"},{"key":"2_CR20","unstructured":"Protalinski, E.: You can now use your android phone as a 2FA security key for google accounts. VentureBeat, April 2019. https:\/\/venturebeat.com\/2019\/04\/10\/you-can-now-use-your-android-phone-as-a-2fa-security-key-for-google-accounts"},{"key":"2_CR21","unstructured":"SoloKeys: Solo 1: open security key supporting FIDO2 & U2F over USB + NFC (2018). https:\/\/github.com\/solokeys\/solo"},{"key":"2_CR22","unstructured":"SoloKeys: Tutorial: writing an extension for the solo stick (2020). https:\/\/github.com\/solokeys\/solo\/blob\/b86f0ee4e563f0b5ceb69770a6d6f64e42a688b6\/docs\/tutorial-getting-started.md"},{"key":"2_CR23","unstructured":"SoloKeys: Solo 2 monorepo (2021). https:\/\/github.com\/solokeys\/solo2"},{"key":"2_CR24","unstructured":"W3C: Web authentication: An API for accessing public key credentials - level 1. W3C recommendation, March 2019. https:\/\/www.w3.org\/TR\/2019\/REC-webauthn-1-20190304\/"},{"key":"2_CR25","unstructured":"W3C: Web authentication: An API for accessing public key credentials - level 2. W3C recommendation, April 2021. https:\/\/www.w3.org\/TR\/2021\/REC-webauthn-2-20210408\/"},{"key":"2_CR26","unstructured":"W3C: Web authentication: An API for accessing public key credentials - level 3. W3C first public working draft, April 2021. https:\/\/www.w3.org\/TR\/2021\/WD-webauthn-3-20210427\/"},{"key":"2_CR27","unstructured":"Yubico: python-fido2, March 2018, https:\/\/github.com\/Yubico\/python-fido2"},{"key":"2_CR28","unstructured":"Yubico: Discover YubiKey 5. strong authentication for secure login, July 2021.https:\/\/www.yubico.com\/products\/yubikey-5-overview"},{"key":"2_CR29","unstructured":"Yubico: libfido2, July 2021. https:\/\/developers.yubico.com\/libfido2"},{"key":"2_CR30","unstructured":"Yubico: webauthn-recovery-extension. https:\/\/github.com\/Yubico\/webauthn-recovery-extension (2021)"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93747-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,12]],"date-time":"2022-05-12T15:08:14Z","timestamp":1652368094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93747-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030937461","9783030937478"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93747-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hosting.services.iit.cnr.it\/etaa2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}