{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:26:48Z","timestamp":1754598408217},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.9947253","type":"proceedings-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T15:49:54Z","timestamp":1668786594000},"page":"91-99","source":"Crossref","is-referenced-by-count":4,"title":["A User-Friendly Two-Factor Authentication Method against Real-Time Phishing Attacks"],"prefix":"10.1109","author":[{"given":"Yuanyi","family":"Sun","sequence":"first","affiliation":[{"name":"School of EECS, The Pennsylvania State University,University Park,PA,16802"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of EECS, The Pennsylvania State University,University Park,PA,16802"}]},{"given":"Yan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shape Security,Santa Clara,CA"}]},{"given":"Pengfei","family":"Sun","sequence":"additional","affiliation":[{"name":"Shape Security,Santa Clara,CA"}]}],"member":"263","reference":[{"journal-title":"Paddle ocr","year":"0","key":"ref10"},{"journal-title":"U2f","year":"0","key":"ref11"},{"journal-title":"Yolo v3 weights","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3131904"},{"key":"ref14","article-title":"Strength-ening user authentication through opportunistic cryptographic identity assertions","author":"czeskis","year":"2012","journal-title":"Proceedings of the ACM CCS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/503124.503156"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_27"},{"key":"ref17","article-title":"Sound-proof: usable two-factor authentication based on ambient sound","author":"karapanos","year":"2015","journal-title":"Usenix Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460905"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_1"},{"journal-title":"Evilginx","year":"0","key":"ref4"},{"journal-title":"Duo Push","year":"0","key":"ref3"},{"journal-title":"Google phone's built-in security key","year":"0","key":"ref6"},{"journal-title":"Fido 2","year":"0","key":"ref5"},{"journal-title":"Man-in-the-middle Attack","year":"0","key":"ref8"},{"journal-title":"IDN homograph attack","year":"0","key":"ref7"},{"journal-title":"The authentication solution government has been slow to adopt","year":"0","key":"ref2"},{"journal-title":"Alexa top 50 sites (freely accessible list)","year":"0","key":"ref1"},{"journal-title":"Open texting online","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550367"},{"key":"ref21","article-title":"Yolov3: An incremental improvement","author":"redmon","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323404"},{"key":"ref23","article-title":"Two-factor authen-tication resilient to server compromise using mix-bandwidth devices","author":"shirvanian","year":"2014","journal-title":"NDSS"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/09947253.pdf?arnumber=9947253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T14:57:04Z","timestamp":1670857024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9947253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.9947253","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}