{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:47Z","timestamp":1725551207874},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_17","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"229-236","source":"Crossref","is-referenced-by-count":4,"title":["Website Credential Storage and Two-Factor Web Authentication with a Java SIM"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Hart","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"17_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM\u00a042(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"17_CR2","unstructured":"Sophos: at risk as one third of surfers admit they use the same password for all websites, http:\/\/www.sophos.com\/pressoffice\/news\/articles\/2009\/03\/password-security.html"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B. Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM\u00a047(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Hart, J., Markantonakis, K., Mayes, K.: Website credential storage and two-factor web authentication with a Java SIM. Cryptology ePrint Archive, Report 2010 (2010)","DOI":"10.1007\/978-3-642-12368-9_17"},{"key":"17_CR5","unstructured":"Wu, M., Garfinkel, S., Miller, R.: Secure web authentication with mobile phones. In: DIMACS Workshop on Usable Privacy and Security Software (2004)"},{"issue":"13","key":"17_CR6","doi-asserted-by":"publisher","first-page":"3715","DOI":"10.1016\/j.comnet.2007.03.007","volume":"51","author":"M.G. Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X., Leung, L.M., Alam, M.A.: SPP: An anti-phishing single password protocol. Comput. Netw.\u00a051(13), 3715\u20133726 (2007)","journal-title":"Comput. Netw."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Mannan, M., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Financial Cryptography, pp. 88\u2013103 (2007)","DOI":"10.1007\/978-3-540-77366-5_11"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-540-85886-7_28","volume-title":"Information Security","author":"D. Flor\u00eancio","year":"2008","unstructured":"Flor\u00eancio, D., Herley, C.: One-time password access to any server without changing the server. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 401\u2013420. Springer, Heidelberg (2008)"},{"key":"17_CR9","unstructured":"3GPP: Specification of the SIM Application Toolkit (SAT) for the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface. TS 11.14, 3rd Generation Partnership Project (3GPP) (2007)"},{"key":"17_CR10","unstructured":"3GPP: Subscriber Identity Module Application Programming Interface (SIM API) for Java Card. TS 03.19, 3rd Generation Partnership Project (3GPP) (2002)"},{"key":"17_CR11","unstructured":"3GPP (U)SIM Application Programming Interface (API); (U)SIM API for Java Card. TS 31.130, 3rd Generation Partnership Project (3GPP) (2009)"},{"key":"17_CR12","volume-title":"Mobile Application Development with SMS and the SIM Toolkit","author":"S.B. Guthery","year":"2001","unstructured":"Guthery, S.B., Cronin, M.: Mobile Application Development with SMS and the SIM Toolkit. McGraw-Hill Professional, New York (2001)"},{"key":"17_CR13","unstructured":"3GPP: Security mechanisms for SIM application toolkit; Stage 2. TS 03.48, 3rd Generation Partnership Project (3GPP) (2005)"},{"key":"17_CR14","unstructured":"Ecrypt II: (Report on key sizes), http:\/\/www.keylength.com\/en\/3\/"},{"key":"17_CR15","unstructured":"Gemalto NV: (Gemalto Developer Suite), http:\/\/www.gemalto.com"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T01:44:02Z","timestamp":1559007842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}