{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:54Z","timestamp":1725551214579},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_26","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"324-331","source":"Crossref","is-referenced-by-count":11,"title":["Security Analysis of Mobile Phones Used as OTP Generators"],"prefix":"10.1007","author":[{"given":"H\u00e5vard","family":"Raddum","sequence":"first","affiliation":[]},{"given":"Lars Hopland","family":"Nest\u00e5s","sequence":"additional","affiliation":[]},{"given":"Kjell J\u00f8rgen","family":"Hole","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Hagalisletto, A.M., Riiber, A.: Using the Mobile Phone in Two-Factor Authentication, Encap white paper, www.encap.no\/admin\/userfiles\/file\/iwssi2007-05.pdf"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Raddum, H., Nest\u00e5s, L.H., Hole, K.J.: Security Analysis of Mobile Phones Used as OTP Generators, Reports in Informatics, 392, The University of Bergen (2010), www.ii.uib.no\/publikasjoner\/texrap\/pdf\/2010-392.pdf","DOI":"10.1007\/978-3-642-12368-9_26"},{"key":"26_CR3","unstructured":"RFC 2631, Diffie\u2013Hellman Key Agreement Method (June 1999), tools.ietf.org\/html\/rfc2631"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., AlFayyadh, B., Grandison, T., AlZomai, M., McNamara, J.: Security Usability Principles for Vulnerability Analysis and Risk Assessment. Presented at the Twenty-Third Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, USA, December 10-14 (2007), www.acsac.org\/2007\/papers\/45.pdf","DOI":"10.1109\/ACSAC.2007.4412995"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Hole, K.J., Klingsheim, A.N., Netland, L.-H., Espelid, Y., Tj\u00f8stheim, T., Moen, V.: Risk Assessment of a National Security Infrastructure. IEEE Security & Privacy (January\/February 2009), www.nowires.org\/Papers-PDF\/RiskEvaluation.pdf","DOI":"10.1109\/MSP.2009.17"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T01:44:16Z","timestamp":1559007856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}