{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:11:47Z","timestamp":1730214707297,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888923","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:10:18Z","timestamp":1664226618000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Securing Password Authentication for Web-based Applications"],"prefix":"10.1109","author":[{"given":"Teik Guan","family":"Tan","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design,Singapore"}]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design,Singapore"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design,Singapore"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"journal-title":"The exact security of ECDSA","year":"2000","author":"brown","key":"ref32"},{"key":"ref31","article-title":"Halting password puzzles","author":"boyen","year":"2007","journal-title":"Proceedings of the 16th USENIX Security Symposium"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.31"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6797"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_36"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"journal-title":"Microsoft threat modeling tool","year":"2020","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0334-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2005.10.001"},{"key":"ref14","first-page":"151","article-title":"The s\/key (tm) one-time password system","author":"haller","year":"1994","journal-title":"Sym-posium on Network and Distributed System Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25867-1_8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80136-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"ref19","first-page":"97","article-title":"The secure remote password protocol","volume":"98","author":"wu","year":"1998","journal-title":"Sympo-sium on Network and Distributed System Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_17"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/2063176.2063197","article-title":"The state of phishing attacks","volume":"55","author":"hong","year":"2012","journal-title":"Communications of the ACM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.10"},{"journal-title":"Phishing activity trends report 2nd qtr 2021","year":"2021","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8018"},{"journal-title":"2020 sonicwall cyber threat report","year":"2020","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.1"},{"journal-title":"Universal 2nd Factor (U2F) Overview","year":"2017","author":"srinivas","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"journal-title":"Html 5 2 W3c recommendation","year":"2017","author":"faulkner","key":"ref9"},{"key":"ref1","article-title":"Dos and don'ts of client authentication on the web","author":"fu","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23036"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5054"},{"key":"ref23","first-page":"317","article-title":"Origin-bound certificates: A fresh approach to strong client authentication for the web","author":"dietz","year":"2012","journal-title":"Proceedings of the 21st USENIX Security Symposium"},{"key":"ref26","article-title":"How to exchange secrets with oblivious transfer","volume":"2005","author":"rabin","year":"2005","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref25","first-page":"1556","article-title":"Protecting accounts from credential stuffing with password breach alerting","author":"thomas","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2022,6,22]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888923.pdf?arnumber=9888923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T15:15:48Z","timestamp":1664291748000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888923","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}