{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:33:35Z","timestamp":1770226415411,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,8]]},"DOI":"10.1109\/csp51677.2021.9357504","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:27:22Z","timestamp":1614288442000},"page":"22-31","source":"Crossref","is-referenced-by-count":5,"title":["Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords"],"prefix":"10.1109","author":[{"given":"Daniel","family":"K\u00f6hler","sequence":"first","affiliation":[{"name":"Faculty of Digital Engineering Hasso-Plattner-Institute,Potsdam,Germany"}]},{"given":"Eric","family":"Klieme","sequence":"additional","affiliation":[{"name":"Faculty of Digital Engineering Hasso-Plattner-Institute,Potsdam,Germany"}]},{"given":"Matthias","family":"Kreuseler","sequence":"additional","affiliation":[{"name":"Faculty of Engineering University Wismar,Wismar,Germany"}]},{"given":"Feng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Faculty of Digital Engineering Hasso-Plattner-Institute,Potsdam,Germany"}]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[{"name":"Faculty of Digital Engineering Hasso-Plattner-Institute,Potsdam,Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref12","article-title":"Entwicklungsstand Quan-tencomputer","author":"wilhelm","year":"2019","journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik Tech Rep Projektnummer 283"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.353"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383385"},{"key":"ref15","year":"0","journal-title":"Passwordless sign-in with the Microsoft Authenticator app - Azure Active Directory"},{"key":"ref16","first-page":"8","article-title":"An Introduction to Evaluating Biometric Systems","author":"jonathon phillips","year":"2000","journal-title":"National Institute of Standards and Technology"},{"key":"ref17","article-title":"Gluu Server 4.1 Docs","year":"2020","journal-title":"Gluu"},{"key":"ref18","article-title":"Securing privacy by design - Biometric services","year":"2019","journal-title":"BioID"},{"key":"ref19","author":"masoudnia","year":"2020","journal-title":"Is Passwordless Really Possible?"},{"key":"ref4","first-page":"38","article-title":"The Quest to Replace Passwords Revisited _ Rating Authentication Schemes","author":"zimmermann","year":"2018","journal-title":"Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)"},{"key":"ref27","article-title":"Security Analysis and Improvement of aMulti-Factor Biometric-Based RemoteAuthentication Scheme","author":"boonkrong","year":"2019","journal-title":"IAENG International Journal of Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref6","first-page":"67","article-title":"Supporting Decision Makers in Choosing Suitable Authentication Schemes","author":"mayer","year":"2016","journal-title":"Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)"},{"key":"ref5","article-title":"ACCESSv2: A Collaborative Authentication Research and Decision Support Platform","author":"mayer","year":"0","journal-title":"Who Are You? Adventures in Authentication Workshop 2018"},{"key":"ref8","article-title":"Technical Report: The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes","author":"bonneau","year":"2012","journal-title":"University of Cambridge Computer Laboratory"},{"key":"ref7","first-page":"7","article-title":"Security of Biometric Authentication Systems","author":"ambalakat","year":"2005","journal-title":"21 st Computer Science Seminar"},{"key":"ref2","article-title":"Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-) use","author":"jaeger","year":"2016","journal-title":"PASSWORDS'16"},{"key":"ref9","first-page":"49","article-title":"The password thicket: Technical and market failures in human authentication on the web","author":"bonneau","year":"0","journal-title":"WEIS 2010 the Ninth Workshop on the Economics of Information Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS180328016B"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000039883.47173.39"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0449-6"},{"key":"ref21","article-title":"Hacking Mobile Phones Using 2D Printed Fingerprints","author":"cao","year":"2016","journal-title":"Michigan State University Tech Rep MSU-CSE"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0125"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717724308"},{"key":"ref25","first-page":"519723e","author":"an","year":"2012","journal-title":"Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards"}],"event":{"name":"2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)","location":"Zhuhai, China","start":{"date-parts":[[2021,1,8]]},"end":{"date-parts":[[2021,1,10]]}},"container-title":["2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9357511\/9357565\/09357504.pdf?arnumber=9357504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:28:46Z","timestamp":1733876926000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9357504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/csp51677.2021.9357504","relation":{},"subject":[],"published":{"date-parts":[[2021,1,8]]}}}