{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T07:40:07Z","timestamp":1740987607199,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642190315"},{"type":"electronic","value":"9783642190322"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19032-2_3","type":"book-chapter","created":{"date-parts":[[2011,3,5]],"date-time":"2011-03-05T02:42:41Z","timestamp":1299292961000},"page":"35-49","source":"Crossref","is-referenced-by-count":5,"title":["Authentication Using Multi-level Social Networks"],"prefix":"10.1007","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Xing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Brainard, J., Juels, A., Rivest, R., Szydlo, M., Yung, M.: Fourth-Factor Authentication: Somebody You Know. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (October 2006)","DOI":"10.1145\/1180405.1180427"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Soleymani, B., Maheswaran, M.: Social Authentication Protocol for Mobile Phones. In: International Conference on Computational Science and Engineering, Vancouver, Canada (August 2009)","DOI":"10.1109\/CSE.2009.390"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Podd, J., Bunnell, J., Henderson, R.: Cost-effective Computer Security: Cognitive and Associative Passwords. In: Proceedings of the 6th Australian Conference on Computer-Human Interaction, Washington, DC,USA, p. 304 (1996)","DOI":"10.1109\/OZCHI.1996.560026"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Zviran, M., Haga, W.: User Authentication by Cognitive Passwords: An Empirical Assessment. In: Proceedings of the 5th Jerusalem Conference on Information Technology, Los Alamitos, CA, USA, pp. 137\u2013144 (1990)","DOI":"10.1109\/JCIT.1990.128279"},{"key":"3_CR5","unstructured":"Ellison, C.: UPnP Security Ceremonies Design Document: For UPnP Device Architecture 1.0 (October 2003), http:\/\/www.upnp.org\/download\/standardizeddcps\/UPnPSecurityCeremonies_1_0secure.pdf"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"McCune, J., Perrig, A., Reiter, M.: Seeing-Is-Believing: Using Camera Phones For Human-Verifiable Authentication. In: IEEE Symposium on Security and Privacy, Berkeley\/Oakland, California, pp. 110\u2013124 (May 2005)","DOI":"10.21236\/ADA457868"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Schechter, S., Egelman, S., Reeder, R.: It\u2019s Not What You Know, But Who You Know: A Social Approach To Last-Resort Authentication. In: Proceeding of the 27th Annual SIGCHI Conference on Human Factors in Computing Systems, Boston, MA, USA (April 2009)","DOI":"10.1145\/1518701.1519003"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Yardi, S., Feamster, N., Bruckman, A.: Photo-Based Authentication Using Social Networks. In: Proceedings of the 1st Workshop on Online Social Networks, Seattle, Washington, USA (August 2008)","DOI":"10.1145\/1397735.1397748"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Aloul, F., Zahidi, S., EI-Hajj, W.: Two Factor Authentication Using Mobile Phones. In: IEEE\/ACS International Conference on Computer Systems and Applications, Rabat, Morocco (May 2009)","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"3_CR10","unstructured":"Trusted Computing Group, http:\/\/www.trustedcomputinggroup.org\/"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"M. Mannan","year":"2007","unstructured":"Mannan, M., Van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol.\u00a04886, pp. 88\u2013103. Springer, Heidelberg (2007)"},{"key":"3_CR12","unstructured":"Santesson, S., Housley, R., Bajaj, S., Rosenthol, L.: Internet X.509 Public Key Infrastructure - Certificate Image, Internet Engineering Task Force (November 2009)"},{"key":"3_CR13","unstructured":"Guhring, P.: Concepts Against Man-in-the-Browser Attacks (2006), http:\/\/www2.futureware.at\/svnlsourcerer\/CAcertlSecureClient.pdf"}],"container-title":["Communications in Computer and Information Science","Knowledge Discovery, Knowlege Engineering and Knowledge Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19032-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T07:04:26Z","timestamp":1740985466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19032-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642190315","9783642190322"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19032-2_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}