{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:29:00Z","timestamp":1742945340337,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642312830"},{"type":"electronic","value":"9783642312847"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31284-7_3","type":"book-chapter","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T10:15:58Z","timestamp":1339582558000},"page":"30-47","source":"Crossref","is-referenced-by-count":4,"title":["Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens"],"prefix":"10.1007","author":[{"given":"Assaf","family":"Ben-David","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Omer","family":"Berkman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yossi","family":"Matias","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sarvar","family":"Patel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cem","family":"Paya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Alkassar, A., St\u00fcble, C., Sadeghi, A.R.: Secure object identification - or: Solving the chess grandmaster problem. In: Proceedings of the Workshop on New Security Paradigms (2003)","DOI":"10.1145\/986655.986668"},{"key":"3_CR2","unstructured":"APGW: Phishing activity trends report (2011), http:\/\/www.antiphishing.org\/reports\/apwg_report_h2_2010.pdf"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/3-540-38424-3_12","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"T. Beth","year":"1991","unstructured":"Beth, T., Desmedt, Y.G.: Identification Tokens \u2013 or: Solving the Chess Grandmaster Problem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 169\u2013176. Springer, Heidelberg (1991)"},{"key":"3_CR4","unstructured":"Eweek (2007), http:\/\/www.eweek.com\/c\/a\/Security\/RSA-Catches-Financial-Phishing-Kit"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Gabber, E., Gibbons, P.B., Kristol, D.M., Matias, Y., Mayer, A.: On secure and pseudonymous client-relationships with multiple servers. ACM Transactions on Information and System Security (1999)","DOI":"10.1145\/330382.330386"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-63594-7_64","volume-title":"Financial Cryptography","author":"E. Gabber","year":"1997","unstructured":"Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol.\u00a01318, pp. 17\u201331. Springer, Heidelberg (1997)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proc. 14th International World Wide Web Conference (2005)","DOI":"10.1145\/1060745.1060815"},{"key":"3_CR8","unstructured":"Higgins, K.J.: Researchers see real-time phishing jump (2010), http:\/\/www.darkreading.com\/authentication\/security\/attacks\/s-howArticle.jhtml?articleID=228200550"},{"key":"3_CR9","unstructured":"Jackson, C., Barth, A.: Beware of finer-grained origins. In: Proceedings of Web 2.0 Security and Privacy, W2SP 2008 (2008)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Myers, S. (eds.): Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley (2006)","DOI":"10.1002\/0470086106"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Karlof, C., Tyger, J., Wagner, D., Shankar, U.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: Computer and Communication Security, CCS (2007)","DOI":"10.1145\/1315245.1315254"},{"key":"3_CR12","doi-asserted-by":"crossref","DOI":"10.1515\/9780691206844","volume-title":"Pseudorandomness and Cryptographic Applications","author":"M. Luby","year":"1996","unstructured":"Luby, M.: Pseudorandomness and Cryptographic Applications. Princeton University Press, Princeton (1996)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"M.S. Mannan","year":"2007","unstructured":"Mannan, M.S., van Oorschot, P.C.: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol.\u00a04886, pp. 88\u2013103. Springer, Heidelberg (2007)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy (2005)","DOI":"10.21236\/ADA457868"},{"key":"3_CR15","unstructured":"The H Security: Mozilla considers removing trustwave CA (2012), http:\/\/www.h-online.com\/security\/news\/item\/Mozilla-considers-removing-Trustwave-CA-1430998.html"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11889663_1","volume-title":"Financial Cryptography and Data Security","author":"B. Parno","year":"2006","unstructured":"Parno, B., Kuo, C., Perrig, A.: Phoolproof Phishing Prevention. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol.\u00a04107, pp. 1\u201319. Springer, Heidelberg (2006)"},{"key":"3_CR17","unstructured":"Prins, J.: Diginotar certificate authority breach - operation black tulip (2011), http:\/\/www.rijksoverheid.nl\/documenten-en-publicaties\/rapporten\/2011\/09\/05\/diginotar-public-report-version-1.html"},{"key":"3_CR18","unstructured":"RFC-2104: HMAC: Keyed-hashing for message authentication"},{"key":"3_CR19","unstructured":"RFC-4033: DNS security introduction and requirements"},{"key":"3_CR20","unstructured":"RFC-4226: HOTP: An HMAC-based one-time password algorithm"},{"key":"3_CR21","unstructured":"RFC-5246: The transport layer security (TLS) protocol version 1.2"},{"key":"3_CR22","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: Proceedings of the 14th Conference on USENIX Security (2005)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Roth, V., Richter, K., Freidinger, R.: A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (2004)","DOI":"10.1145\/1030083.1030116"},{"issue":"4","key":"3_CR24","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1145\/1053291.1053327","volume":"48","author":"Bruce Schneier","year":"2005","unstructured":"Schneier, B.: Two-factor authentication: Too little, too late. Communications of the ACM\u00a04(4) (2005)","journal-title":"Communications of the ACM"},{"key":"3_CR25","unstructured":"Schneier, B.: Hacking two-factor authentication (2009), http:\/\/www.schneier.com\/blog\/archives\/2009\/09\/hacking_two-fac.html"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-642-14577-3_4","volume-title":"Financial Cryptography and Data Security","author":"F. Stajano","year":"2010","unstructured":"Stajano, F., Wong, F.-L., Christianson, B.: Multichannel Protocols to Prevent Relay Attacks. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 4\u201319. Springer, Heidelberg (2010)"},{"key":"3_CR27","unstructured":"Symantec (2010), http:\/\/www.symantec.com\/connect\/blogs\/beware-new-type-phishing-attack"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Yee, K., Sitaker, K.: Passpet: Convenient password management and phishing protection. In: Symposium On Usable Privacy and Security, SOUPS (2006)","DOI":"10.1145\/1143120.1143126"},{"key":"3_CR29","unstructured":"Zusman, M., Sotirov, A.: Breaking the myths of extended validation SSL certificates. In: Black Hat (2009)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31284-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T21:15:38Z","timestamp":1642454138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31284-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312830","9783642312847"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31284-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}