{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:04:13Z","timestamp":1742915053179,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_3","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"41-57","source":"Crossref","is-referenced-by-count":2,"title":["KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Ebert","sequence":"first","affiliation":[]},{"given":"Chadly","family":"Marouane","sequence":"additional","affiliation":[]},{"given":"Benno","family":"Rott","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Werner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2013","key":"3_CR1","first-page":"386","volume":"7","author":"B Eimeren Van","year":"2013","unstructured":"Van Eimeren, B.: Always on - smartphone, tablet und co. als neue taktgeber im netz (ard\/zdf). Media Perspektiven 7(2013), 386\u2013390 (2013)","journal-title":"Media Perspektiven"},{"issue":"12","key":"3_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM 42(12), 40\u201346 (1999)","journal-title":"Communications of the ACM"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 44\u201355. ACM (2006)","DOI":"10.1145\/1143120.1143127"},{"issue":"11","key":"3_CR5","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: A case history. Communications of the ACM 22(11), 594\u2013597 (1979)","journal-title":"Communications of the ACM"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Parwani, T., Kholoussi, R., Karras, P.: How to hack into facebook without being a hacker. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 751\u2013754. International World Wide Web Conferences Steering Committee (2013)","DOI":"10.1145\/2487788.2488036"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 553\u2013567. IEEE (2012)","DOI":"10.1109\/SP.2012.44"},{"issue":"11","key":"3_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(14)70111-4","volume":"2014","author":"K Munro","year":"2014","unstructured":"Munro, K.: Android scraping: accessing personal data on mobile devices. Network Security 2014(11), 5\u20139 (2014)","journal-title":"Network Security"},{"key":"3_CR9","unstructured":"Android 5.0 Encryption 2015. \n                    https:\/\/source.android.com\/devices\/tech\/security\/encryption\/\n                    \n                   (accessed January 20, 2015)"},{"key":"3_CR10","unstructured":"Heider, J., Boll, M.: iOS keychain weakness FAQ. Fraunhofer Institute for Secure Technology (2011)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: Rfc 2818: Http over tls. Internet Engineering Task Force (2000)","DOI":"10.17487\/rfc2818"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X. 509 internet public key infrastructure online certificate status protocol. IETF RFC2560, June 1999","DOI":"10.17487\/rfc2560"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V.: The most dangerous code in the world: validating ssl certificates in non-browser software. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 38\u201349. ACM (2012)","DOI":"10.1145\/2382196.2382204"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., et al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475\u2013488. ACM (2014)","DOI":"10.1145\/2663716.2663755"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Tsoutsos, N.G., Maniatakos, M.: Trust no one: thwarting \u201cheartbleed\u201d attacks using privacy-preserving computation. In: 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 59\u201364. IEEE (2014)","DOI":"10.1109\/ISVLSI.2014.86"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F Callegati","year":"2009","unstructured":"Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the https protocol. IEEE Security and Privacy 7(1), 78\u201381 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Czeskis, A., Dietz, M., Kohno, T., Wallach, D., Balfanz, D.: Strengthening user authentication through opportunistic cryptographic identity assertions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 404\u2013414. ACM (2012)","DOI":"10.1145\/2382196.2382240"},{"key":"3_CR18","unstructured":"Borchert, B.: Ekaay-smart login (2013). \n                    http:\/\/www.ekaay.com\/"},{"key":"3_CR19","unstructured":"eKaay Smart Login System (2015). \n                    http:\/\/www.ekaay.com\/\n                    \n                   (accessed January 14, 2015)"},{"key":"3_CR20","unstructured":"Van Rijswijk, R.M., Van Dijk, J.: Tiqr: a novel take on two-factor authentication. In: LISA (2011)"},{"key":"3_CR21","unstructured":"Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Snap2pass: Consumer-friendly challenge-response authentication with a phone. Stanford University (2010)"},{"key":"3_CR22","unstructured":"Galois QR Authentication (2015). \n                    http:\/\/galois.com\/blog\/2011\/01\/quick-authentication-using-mobile-devices-and-qr-codes\/\n                    \n                   (accessed January 19, 2015)"},{"key":"3_CR23","unstructured":"Schieb, J.: Schieb. de Wissen\u2014Das sichere Login: So haben Hacker keine Chance, vol. 1, pp. 42\u201344 (2014)"},{"key":"3_CR24","unstructured":"Click2Pass Handy statt Passwort (2015). \n                    http:\/\/www.click2pass.net\/\n                    \n                   (accessed January 14, 2015)"},{"key":"3_CR25","unstructured":"Next Authentication and Authorization Plattform (2015). \n                    https:\/\/launchkey.com\/platform\/mobile\/\n                    \n                   (accessed January 14, 2015)"},{"key":"3_CR26","unstructured":"Zapper (2015). \n                    https:\/\/www.zapper.com\/about.php\/\n                    \n                   (accessed January 19, 2015)"},{"key":"3_CR27","unstructured":"CLEF Secure Two Factor Login (2015). \n                    https:\/\/getclef.com\/features\/\n                    \n                   (accessed January 19, 2015)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Jones, M., Hardt, D.: The oauth 2.0 authorization framework: Bearer token usage. Technical report, RFC 6750, October 2012","DOI":"10.17487\/rfc6750"},{"key":"3_CR29","unstructured":"OneID (2015). \n                    https:\/\/www.oneid.com\/\n                    \n                   (accessed September 03, 2015)"},{"key":"3_CR30","unstructured":"KnockToUnlock (2015). \n                    http:\/\/www.knocktounlock.com\/\n                    \n                   (accessed September 03, 2015)"},{"key":"3_CR31","unstructured":"BlueID (2015). \n                    https:\/\/www.blueid.net\/\n                    \n                   (accessed September 03, 2015)"},{"key":"3_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/11542322_6","volume-title":"Security Protocols","author":"N Asokan","year":"2005","unstructured":"Asokan, N., Niemi, V., Nyberg, K.: Man-in-the-middle in tunnelled authentication protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 28\u201341. Springer, Heidelberg (2005)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"issue":"1","key":"3_CR34","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2063176.2063197","volume":"55","author":"J Hong","year":"2012","unstructured":"Hong, J.: The state of phishing attacks. Communications of the ACM 55(1), 74\u201381 (2012)","journal-title":"Communications of the ACM"},{"key":"3_CR35","unstructured":"Silver, D., Jana, S., Chen, E., Jackson, C., Boneh, D.: Password managers: attacks and defenses. In: Proceedings of the 23rd Usenix Security Symposium (2014)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:18:53Z","timestamp":1559373533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}