{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:23:07Z","timestamp":1761974587608,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_49","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"464-471","source":"Crossref","is-referenced-by-count":2,"title":["Active One-Time Password Mechanism for User Authentication"],"prefix":"10.1007","author":[{"given":"Chun-I","family":"Fan","sequence":"first","affiliation":[]},{"given":"Chien-Nan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chi-Yao","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Chung-Yu","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","unstructured":"TS 23.040: Technical Realization Short Message Service (SMS) 3GPP (Online), http:\/\/www.3gpp.org\/"},{"key":"49_CR2","unstructured":"I. T. Report, ITU Internet Rep. 2006: Digital.Life (Online) (2006), http:\/\/www.itu.int\/"},{"key":"49_CR3","unstructured":"One-time password, Wikipedia 2011 (2011), http:\/\/en.wikipedia.org\/wiki\/One-timepassword"},{"key":"49_CR4","first-page":"500","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"S. Chiasson","year":"2009","unstructured":"Chiasson, S., Forget, A., Stobert, E., van Oorschot, P.C., Biddle, R.: Multiple password interference in text passwords and click-based graphical passwords3. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 500\u2013511. ACM, New York (2009)"},{"key":"49_CR5","first-page":"581","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 581\u2013590. ACM, New York (2006)"},{"key":"49_CR6","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/1242572.1242661","volume-title":"Proceedings of the 16th International Conference on World Wide Web, WWW 2007","author":"D. Florencio","year":"2007","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 657\u2013666. ACM, New York (2007)"},{"key":"49_CR7","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/1143120.1143127","volume-title":"Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUP 2006","author":"S. Gaw","year":"2006","unstructured":"Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUP 2006, pp. 44\u201355. ACM, New York (2006)"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1145\/1060745.1060815","volume-title":"Proceedings of the 14th International Conference on World Wide Web, WWW 2005","author":"J.A. Halderman","year":"2005","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceedings of the 14th International Conference on World Wide Web, WWW 2005, pp. 471\u2013479. ACM, New York (2005)"},{"key":"49_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04444-1_1","volume-title":"Computer Security \u2013 ESORICS 2009","author":"T. Holz","year":"2009","unstructured":"Holz, T., Engelberth, M., Freiling, F.: Learning more about the underground economy: A case-study of keyloggers and dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 1\u201318. Springer, Heidelberg (2009)"},{"issue":"4","key":"49_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B. Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM\u00a047(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"key":"49_CR11","first-page":"1","volume-title":"Proceedings of the 8th Conference on USENIX Security Symposium, SSYM 1999","author":"I. Jermyn","year":"1999","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th Conference on USENIX Security Symposium, SSYM 1999, vol.\u00a08, p. 1. USENIX Association, Berkeley (1999)"},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1315245.1315254","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007","author":"C. Karlof","year":"2007","unstructured":"Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 58\u201371. ACM, New York (2007)"},{"issue":"12","key":"49_CR13","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L. O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE\u00a091(12), 2021\u20132040 (2003)","journal-title":"Proceedings of the IEEE"},{"key":"49_CR14","unstructured":"Perrig, A., Song, D.: Hash visualization: a new technique to improve real-world security. In: International Workshop on Cryptographic Techniques and E-Commerce, pp. 131\u2013138 (1999)"},{"key":"49_CR15","first-page":"161","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002","author":"B. Pinkas","year":"2002","unstructured":"Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 161\u2013170. ACM, New York (2002)"},{"key":"49_CR16","first-page":"4","volume-title":"Proceedings of the 1st Conference Workshop on Hot Topics in Understanding Botnets, HotBot 2007","author":"N. Provos","year":"2007","unstructured":"Provos, N., Mcnamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser: Analysis of web-based malware. In: Proceedings of the 1st Conference Workshop on Hot Topics in Understanding Botnets, HotBot 2007, p. 4. USENIX Association, Berkeley (2007)"},{"issue":"3","key":"49_CR17","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1197\/jamia.M1681","volume":"12","author":"U. Sax","year":"2005","unstructured":"Sax, U., Kohane, I.S., Mandl, K.D.: Wireless technology infrastructures for authentication of patients: PKI that rings. Journal of the American Medical Informatics Association\u00a012(3), 263\u2013268 (2005)","journal-title":"Journal of the American Medical Informatics Association"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Thorpe, J., van Oorschot, P.: Towards secure design choices for implementing graphical passwords. In: 20th Annual Computer Security Applications Conference, pp. 50\u201360 (2004)","DOI":"10.1109\/CSAC.2004.44"},{"issue":"1-2","key":"49_CR19","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S. Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Passpoints: Design and longitudinal evaluation of a graphical password system. Int. J. Hum.-Comput. Stud.\u00a063(1-2), 102\u2013127 (2005)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"49_CR20","first-page":"177","volume-title":"Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2006","author":"S. Wiedenbeck","year":"2006","unstructured":"Wiedenbeck, S., Waters, J., Sobrado, L., Birget, J.C.: Design and evaluation of a shoulder-surfing resistant graphical password scheme. In: Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2006, pp. 177\u2013184. ACM, New York (2006)"},{"key":"49_CR21","first-page":"32","volume-title":"Proceedings of the 2nd Symposium on Usable Privacy Security, SOUPS 2006","author":"P. YeeK","year":"2006","unstructured":"Yee, K, P., Sitaker, K.: Passpet: Convenient password management and phishing protection. In: Proceedings of the 2nd Symposium on Usable Privacy Security, SOUPS 2006, pp. 32\u201343. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:38:45Z","timestamp":1746002325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}