{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:57:31Z","timestamp":1767085051764,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319198897"},{"type":"electronic","value":"9783319198903"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19890-3_29","type":"book-chapter","created":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T05:31:58Z","timestamp":1434000718000},"page":"449-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Two Factor Authentication Made Easy"],"prefix":"10.1007","author":[{"given":"Alex Q.","family":"Chen","sequence":"first","affiliation":[]},{"given":"Weihan","family":"Goh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,10]]},"reference":[{"key":"29_CR1","unstructured":"business password analysis - trustwave. \n                      https:\/\/gsr.trustwave.com\/topics\/business-password-analysis\/2014-business-password-analysis\/\n                      \n                     (accessed February 13, 2015)"},{"key":"29_CR2","unstructured":"Is leaked? \n                      https:\/\/isleaked.com\/\n                      \n                     (accessed: February 13, 2015)"},{"key":"29_CR3","unstructured":"Microsoft account - android apps on google play. \n                      https:\/\/play.google.com\/store\/apps\/details?id=com.microsoft.msa.authenticator&hl=en\n                      \n                     (accessed: February 13, 2015)"},{"key":"29_CR4","unstructured":"Security alerts from knowem: Gmail hack. \n                      https:\/\/securityalert.knowem.com\/\n                      \n                     (accessed: February 13, 2015)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Alghathbar, K., Mahmoud, H.: Noisy password scheme: A new one time password system. In: Canadian Conference on Electrical and Computer Engineering, CCECE 2009, pp. 841\u2013846 (2009)","DOI":"10.1109\/CCECE.2009.5090247"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-642-31284-7_3","volume-title":"Applied Cryptography and Network Security","author":"A Ben-David","year":"2012","unstructured":"Ben-David, A., Berkman, O., Matias, Y., Patel, S., Paya, C., Yung, M.: Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 30\u201347. Springer, Heidelberg (2012)"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10209-011-0251-y","volume":"11","author":"A Brown","year":"2012","unstructured":"Brown, A., Jay, C., Chen, A.Q., Harper, S.: The Uptake of Web 2.0 Technologies, and Its Impact On Visually Disabled Users. Universal Access in the Information Society 11, 185\u2013199 (2012)","journal-title":"Universal Access in the Information Society"},{"issue":"3","key":"29_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1080\/03610730590948177","volume":"31","author":"AL Chasteen","year":"2005","unstructured":"Chasteen, A.L., Bhattacharyya, S., Horhota, M., Tam, R., Hasher, L.: How feelings of stereotype threat influence older adults\u2019 memory performance. Experimental Aging Research 31(3), 235\u2013260 (2005)","journal-title":"Experimental Aging Research"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1037\/0882-7974.21.2.333","volume":"21","author":"SJ Czaja","year":"2006","unstructured":"Czaja, S.J., Charness, N., Fisk, A.D., Hertzog, C., Nair, S.N., Rogers, W.A., Sharit, J.: Factors predicting the use of technology: Findings from the center for research and education on aging and technology enhancement (create). Psychology and Aging 21(2), 333\u2013352 (2006)","journal-title":"Psychology and Aging"},{"key":"29_CR10","unstructured":"De Cristofaro, E., Du, H., Freudiger, J., Norcie, G.: A comparative usability study of Two-Factor authentication (2014). \n                      http:\/\/arxiv.org\/abs\/1309.5344"},{"key":"29_CR11","unstructured":"Grim, E.: Two-factor authentication systems and methods (2013). \n                      https:\/\/www.google.com\/patents\/US8578454\n                      \n                    , US Patent 8,578 454"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Holman, J., Lazar, J., Feng, J.H., D\u2019Arcy, J.: Developing usable CAPTCHAs for blind users. In: Proceedings of the 9th International ACM SIGACCESS Conference on Computers and Accessibility, ASSETS 2007 pp. 245\u2013246. ACM (2007)","DOI":"10.1145\/1296843.1296894"},{"issue":"12","key":"29_CR13","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.ijhcs.2008.03.002","volume":"66","author":"S Kurniawan","year":"2008","unstructured":"Kurniawan, S.: Older people and mobile phones: A multi-method investigation. International Journal of Human-Computer Studies 66(12), 889\u2013901 (2008)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"6","key":"29_CR14","doi-asserted-by":"publisher","first-page":"2098","DOI":"10.1016\/j.chb.2011.06.004","volume":"27","author":"D Lunn","year":"2011","unstructured":"Lunn, D., Harper, S.: Providing assistance to older users of dynamic web content. Computers in Human Behavior 27(6), 2098\u20132107 (2011)","journal-title":"Computers in Human Behavior"},{"key":"29_CR15","unstructured":"Mallenius, S., Rossi, M., Tuunainen, V.K.: Factors affecting the adoption and use of mobile devices and services by elderly people-results from a pilot study. Paper presented at the 6th Annual Global Mobility Roundtable, Los Angeles, CA (2007)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"M\u2019Raihi, D., Bellare, M., Hoornaert, F., Naccache, D., Ranen, O.: RFC 4226-HOTP: An HMAC-Based One-Time Password Algorithm (2005)","DOI":"10.17487\/rfc4226"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"M\u2019Raihi, D., Machani, S., Pei, M., Rydell, J.: RFC 6238-TOTP: Time-Based One-Time Password Algorithm (2011)","DOI":"10.17487\/rfc6238"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Perlmutter, M., Mitchell, D.B.: The Appearance and Disappearance of Age Differences in Adult Memory, vol. 8, ch. 7, pp. 127\u2013144. Springer, US (1982)","DOI":"10.1007\/978-1-4684-4178-9_7"},{"issue":"11","key":"29_CR19","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1016\/j.jss.2011.05.035","volume":"84","author":"I Plaza","year":"2011","unstructured":"Plaza, I., Mart\u00edn, L., Martin, S., Medrano, C.: Mobile applications in an aging society: Status and trends. Journal of Systems and Software 84(11), 1977\u20131988 (2011)","journal-title":"Journal of Systems and Software"},{"key":"29_CR20","unstructured":"Rubin, A.D.: Independent one-time passwords. In: Proceedings of the 5th Conference on USENIX UNIX Security Symposium, SSYM 1995, vol. 5, pp. 15\u201315. USENIX Association (1995)"},{"issue":"1","key":"29_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2014.11","volume":"12","author":"MA Sasse","year":"2014","unstructured":"Sasse, M.A., Palmer, C.C.: Protecting you. IEEE Security & Privacy 12(1), 11\u201313 (2014)","journal-title":"IEEE Security & Privacy"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Shirey, R.: Rfc 4949-internet security glossary (2007)","DOI":"10.17487\/rfc4949"},{"issue":"4","key":"29_CR23","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s10209-013-0324-1","volume":"13","author":"J Zhou","year":"2014","unstructured":"Zhou, J., Rau, P.L., Salvendy, G.: Age-Related Difference In The Use Of Mobile Phones. Universal Access in the Information Society 13(4), 401\u2013413 (2014)","journal-title":"Universal Access in the Information Society"}],"container-title":["Lecture Notes in Computer Science","Engineering the Web in the Big Data Era"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19890-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:20:16Z","timestamp":1592871616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19890-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319198897","9783319198903"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19890-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"10 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}