{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:09:42Z","timestamp":1742962182882,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175015"},{"type":"electronic","value":"9783642175022"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17502-2_2","type":"book-chapter","created":{"date-parts":[[2010,11,27]],"date-time":"2010-11-27T00:32:28Z","timestamp":1290817948000},"page":"15-26","source":"Crossref","is-referenced-by-count":1,"title":["User Authentication for Online Applications Using a USB-Based Trust Device"],"prefix":"10.1007","author":[{"given":"Julian","family":"Jang","sequence":"first","affiliation":[]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"John","family":"Zic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Aladdin eToken, \n                    \n                      http:\/\/www.aladdin.com\/etoken"},{"issue":"6","key":"2_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1516046.1516066","volume":"52","author":"A. Barth","year":"2009","unstructured":"Barth, A., Jackson, C., Mitchell, J.: Securing frame communication in browsers. Communications of the ACM\u00a052(6), 83\u201391 (2009)","journal-title":"Communications of the ACM"},{"key":"2_CR3","unstructured":"Federal Financial Institutions Examination Council (FFIEC): Authentication in an internet banking environment, \n                    \n                      http:\/\/federalreserve.gov\/boarddocs\/srletters\/2005\/SR0519a1.pdf"},{"issue":"6","key":"2_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S0965-2590(08)70153-1","volume":"20","author":"S. Frischat","year":"2008","unstructured":"Frischat, S.: The next generation of USB security tokens. Card Technology Today\u00a020(6), 10\u201311 (2008)","journal-title":"Card Technology Today"},{"key":"2_CR5","unstructured":"Fs2pv: A cryptographic-Protocol Verifier for F#, \n                    \n                      http:\/\/research.microsoft.com\/en-us\/downloads\/d54de3ef-085e-47f0-b7dc-8d56c858aba2\/default.aspx"},{"key":"2_CR6","unstructured":"F-Secure virus descriptions: Cabir, \n                    \n                      http:\/\/www.f-secure.com\/v-descs\/cabir.shtml"},{"key":"2_CR7","unstructured":"Redbrowser, A.: F-Secure Trojan information pages, \n                    \n                      http:\/\/www.f-secure.com\/v-descs\/redbrowser_a.shtml"},{"issue":"5","key":"2_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MSP.2007.127","volume":"5","author":"V. Gratzer","year":"2007","unstructured":"Gratzer, V., Naccache, D.: Trust on a Nationwide Scale. IEEE Security and Privacy\u00a05(5), 69\u201371 (2007)","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2006.50","volume":"4","author":"A. Hiltgen","year":"2006","unstructured":"Hiltgen, A., Kramp, T., Weigold, T.: Secure Internet Banking Authentication. IEEE Security and Privacy\u00a04(2), 21\u201329 (2006)","journal-title":"IEEE Security and Privacy"},{"key":"2_CR10","unstructured":"IronKey, \n                    \n                      https:\/\/www.ironkey.com\/"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Jackson, C., Wang, H.: Subspace: Secure Cross-Domain Communication for Web Mashups. In: 16th International Conference on World Wide Web (WWW 2007), pp. 611\u2013620 (2007)","DOI":"10.1145\/1242572.1242655"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/11914853_26","volume-title":"On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE","author":"J. Jang","year":"2006","unstructured":"Jang, J., Nepal, S., Zic, J.: Establishing a Trust Relationship in Cooperative Information Systems. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol.\u00a04275, pp. 426\u2013443. Springer, Heidelberg (2006)"},{"key":"2_CR13","unstructured":"Kolodgy, C.J.: Identity management in a virtual world. IDC White Paper (2003)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography (FC) 2006","author":"M. Mannan","year":"2007","unstructured":"Mannan, M., van Oorschot, P.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2006 and USEC 2006. LNCS, vol.\u00a04886, pp. 88\u2013103. Springer, Heidelberg (2007)"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cose.2004.06.014","volume":"24","author":"J. Marchesini","year":"2005","unstructured":"Marchesini, J., Smith, S.W., Zhao, M.: KeyJacking: The Surprising Insecurity of Client-Side SSL. Computers and Security\u00a024(2), 109\u2013123 (2005)","journal-title":"Computers and Security"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Moreland, D., Nepal, S., Hwang, H., Zic, J.: A snapshot of trusted personal devices applicable to transaction processing. Jnl. of Personal and Ubiquitous Computing (2009), doi:10.1007\/s00779-009-0235-6","DOI":"10.1007\/s00779-009-0235-6"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-540-76848-7_17","volume-title":"CoopIS 2006","author":"S. Nepal","year":"2007","unstructured":"Nepal, S., Zic, J., Hwang, H., Moreland, D.: Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems. In: Meersman, R., Tari, Z. (eds.) CoopIS 2006. LNCS, vol.\u00a04803, pp. 253\u2013271. Springer, Heidelberg (2007)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11889663_1","volume-title":"Financial Cryptography and Data Security","author":"B. Parno","year":"2006","unstructured":"Parno, B., Kuo, C., Perrig, A.: Phoolproof phishing prevention. In: Di Crescenzo, G., Rubin, A.D. (eds.) FC 2006. LNCS, vol.\u00a04107, pp. 1\u201319. Springer, Heidelberg (2006)"},{"key":"2_CR19","unstructured":"ProVerif: Cryptographic Protocol Verifier in Formal Model, \n                    \n                      www.proverif.ens.fr\/"},{"issue":"7","key":"2_CR20","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/514236.514239","volume":"45","author":"K. Shelfer","year":"2002","unstructured":"Shelfer, K., Procaccion, J.: Smart Card Evolution. Communications of the ACM\u00a045(7), 83\u201388 (2002)","journal-title":"Communications of the ACM"},{"key":"2_CR21","unstructured":"Trusted Computing Group, \n                    \n                      www.trustedcomputinggroup.org"},{"key":"2_CR22","unstructured":"Trusted Platform Module (TPM) Working Group, \n                    \n                      www.trustedcomputinggroup.org\/groups\/tpm"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17502-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:14:22Z","timestamp":1558401262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17502-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175015","9783642175022"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17502-2_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}