{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:27:20Z","timestamp":1725892040107},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346378"},{"type":"electronic","value":"9783642346385"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34638-5_4","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T15:14:46Z","timestamp":1350486886000},"page":"44-52","source":"Crossref","is-referenced-by-count":2,"title":["Protected Login"],"prefix":"10.1007","author":[{"given":"Alexei","family":"Czeskis","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Balfanz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Balfanz, D., Smetters, D., Upadhyay, M., Barth, A.: TLS Origin-Bound Certificates (Working Draft) (July 2011), http:\/\/tools.ietf.org\/html\/draft-balfanz-tls-obc"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1145\/1518701.1518837","volume-title":"Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009","author":"K.M. Everitt","year":"2009","unstructured":"Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, pp. 889\u2013898. ACM, New York (2009)"},{"key":"4_CR3","unstructured":"Facebook. What are Login Notifications? (2011), https:\/\/www.facebook.com\/help\/?faq=162968940433354"},{"key":"4_CR4","unstructured":"Fallows, J.: Hacked! (2011), http:\/\/www.theatlantic.com\/magazine\/archive\/2011\/11\/hacked\/8673\/"},{"key":"4_CR5","first-page":"1107","volume-title":"Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010","author":"A. Forget","year":"2010","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, pp. 1107\u20131110. ACM, New York (2010)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-04474-8_23","volume-title":"Information Security","author":"S. Gajek","year":"2009","unstructured":"Gajek, S., Schwenk, J., Steiner, M., Xuan, C.: Risks of the CardSpace Protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 278\u2013293. Springer, Heidelberg (2009)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Herley, C., van Oorschot, P.: A Research Agenda Acknowledging the Persistence of Passwords. IEEE Security & Privacy Magazine (2011)","DOI":"10.1109\/MSP.2011.150"},{"key":"4_CR8","unstructured":"Google Inc. Getting started with 2-step verification (2011), http:\/\/goo.gl\/5r8Za"},{"key":"4_CR9","unstructured":"Leyden, J.: Anonymous hack showed password re-use becoming endemic (2011), http:\/\/www.theregister.co.uk\/2011\/02\/10\/password_re_use_study\/"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Williams, N.: On the Use of Channel Bindings to Secure Channels. RFC 5056, RFC Editor (November 2007), http:\/\/www.ietf.org\/rfc\/rfc5056.txt","DOI":"10.17487\/rfc5056"},{"key":"4_CR11","unstructured":"Zetter, K.: Diginotar files for bankruptcy in wake of devastating hack (2011), http:\/\/www.wired.com\/threatlevel\/2011\/09\/diginotar-bankruptcy\/"},{"key":"4_CR12","unstructured":"Zetter, K.: Sarah Palin E-mail Hacker Sentenced to 1 Year in Custody (2011), http:\/\/www.wired.com\/threatlevel\/2010\/11\/palin-hacker-sentenced\/"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34638-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T09:20:49Z","timestamp":1643534449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34638-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346378","9783642346385"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34638-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}