{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:42:24Z","timestamp":1743154944453,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_19","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"197-215","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["I Bought a New Security Token and All I Got Was This Lousy Phish\u2014Relay Attacks on Visual Code Authentication Schemes"],"prefix":"10.1007","author":[{"given":"Graeme","family":"Jenkinson","sequence":"first","affiliation":[]},{"given":"Max","family":"Spencer","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Warrington","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Stajano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/3-540-38424-3_12","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"T Beth","year":"1991","unstructured":"Beth, T., Desmedt, Y.G.: Identification tokens \u2013 or: solving the chess grandmaster problem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 169\u2013176. Springer, Heidelberg (1991)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP \u201912, pp. 553\u2013567. IEEE Computer Society, Washington (2012). http:\/\/dx.doi.org\/10.1109\/SP.2012.44","DOI":"10.1109\/SP.2012.44"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"19_CR4","unstructured":"Cobos, J.J.L., Hoz, P.C.D.L.: Method and system for authenticating a user my means of a mobile device. Patent filed 17 September 2009, published 4 September 2012"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"YG Desmedt","year":"1988","unstructured":"Desmedt, Y.G., Goutier, C., Bengio, S.: Special uses and abuses of the fiat shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21\u201339. Springer, Heidelberg (1988). http:\/\/dl.acm.org\/citation.cfm?id=646752.704723"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"YG Desmedt","year":"1988","unstructured":"Desmedt, Y.G., Goutier, C., Bengio, S.: Special uses and abuses of the fiat shamir passport protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21\u201339. Springer, Heidelberg (1988)"},{"key":"19_CR7","unstructured":"DeSoto, D.B., Peskin, M.A.: Login using QR code. Patent filed 15 February 2013, published 22 August 2013"},{"key":"19_CR8","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-642-29336-8_2","volume-title":"Mobile Computing, Applications, and Services","author":"B Dodson","year":"2012","unstructured":"Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Secure, consumer-friendly web authentication and payments with a phone. In: Gris, M., Yang, G. (eds.) MobiCASE 2010. LNICST, vol. 76, pp. 17\u201338. Springer, Heidelberg (2012)"},{"key":"19_CR9","unstructured":"Fu, H.P.: Pico: no more passwords! Msc thesis, University of Leuven, Flanders, Belgium (2013). https:\/\/www.cosic.esat.kuleuven.be\/publications\/thesis-232.pdf"},{"key":"19_CR10","unstructured":"Gibson, S.: Secure quick reliable login. https:\/\/www.grc.com\/sqrl\/sqrl.htm, October 2013. Accessed 6 Nov 2013"},{"key":"19_CR11","unstructured":"Howard, A.: QRAuth. Bsc. thesis, Bournemouth University, Bournemouth, UK (2012). https:\/\/www.grc.com\/sqrl\/files\/Adam-Howard-FYP-Dissertation.pdf"},{"key":"19_CR12","unstructured":"Computing Objects Inc.: QRAuth. http:\/\/www.computingobjects.com\/qrauthinfo (2012). Accessed 13 Nov 2013"},{"key":"19_CR13","unstructured":"ISO: Information technology\u2013automatic identification and data capture techniques\u2013QR Code 2005 bar code symbology specification. ISO 18004:2006, International Organization for Standardization, Geneva, Switzerland (2006)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/BFb0028162","volume-title":"Security Protocols","author":"J Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Protocol interactions and the chosen protocol attack. In: Christianson, B., Lomas, M., Crispo, B., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 91\u2013104. Springer, Heidelberg (1998). http:\/\/dl.acm.org\/citation.cfm?id=647215.720386"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u2018SIGn-and-MAc approach\u2019 to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003). http:\/\/dx.doi.org\/10.1007\/978-3-540-45146-4_24"},{"key":"19_CR16","unstructured":"Laurie, B., Singer, A.: Choose the red pill and the blue pill: a position paper. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW \u201908, pp. 127\u2013133. ACM, New York (2008). http:\/\/doi.acm.org\/10.1145\/1595676.1595695"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"MS Mannan","year":"2007","unstructured":"Mannan, M.S., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 88\u2013103. Springer, Heidelberg (2007). http:\/\/dl.acm.org\/citation.cfm?id=1785594.1785610"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"M\u2019Raihi, D., Rydell, J., Bajaj, S., Machani, S., Naccache, D.: OCRA: OATH Challenge-Response Algorithm. RFC 6287 (Informational), June 2011. http:\/\/www.ietf.org\/rfc\/rfc6287.txt","DOI":"10.17487\/rfc6287"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Financial Cryptography and Data Security","author":"B Parno","year":"2006","unstructured":"Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 1\u201319. Springer, Heidelberg (2006)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-3-642-25867-1_6","volume-title":"Security Protocols XIX","author":"F Stajano","year":"2011","unstructured":"Stajano, F., Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49\u201381. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-25867-1_6"},{"key":"19_CR21","unstructured":"Van Rijswijk, R.M., Van Dijk, J.: Tiqr: a novel take on two-factor authentication. In: Proceedings of the 25th International Conference on Large Installation System Administration, LISA\u201911, p. 7. USENIX Association, Berkeley (2011). http:\/\/dl.acm.org\/citation.cfm?id=2208488.2208495"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T23:56:00Z","timestamp":1674172560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}