{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:22:26Z","timestamp":1759335746919,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icumt.2017.8255200","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:49:48Z","timestamp":1516038588000},"page":"129-136","source":"Crossref","is-referenced-by-count":13,"title":["Multi-factor authentication: A survey and challenges in V2X applications"],"prefix":"10.1109","author":[{"given":"Aleksandr","family":"Ometov","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Bezzateev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security and Usability Designing Secure Systems that People Can Use","year":"2005","author":"cranor","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2261691"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-805-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2593898"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"journal-title":"Multiple vehicle authentication for entry and starting systems","year":"2005","author":"utter","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/jsan6020005"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.35"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054104002510"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.08.004"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-3003(03)00355-2"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.04.008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.009"},{"key":"ref64","first-page":"1","article-title":"Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function","author":"bezzateev","year":"2017","journal-title":"Proc of Second International Conference on Advanced Wireless Information Data and Communication Technologies (AWICT 2017)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_45"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-38b"},{"journal-title":"Global Mobile Data Traffic Forecast 20112016","year":"2017","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"ref22","first-page":"1","article-title":"BioFIM: Multifactor Authentication for Defeating Vehicle Theft","volume":"1","author":"tahir","year":"2008","journal-title":"Proc of the World Congress on Engineering"},{"key":"ref21","first-page":"22","article-title":"Fingerprint based biometric ATM authentication system","volume":"3","author":"sunehra","year":"2014","journal-title":"International Journal of Engineering Inventions"},{"key":"ref24","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"ishtiaq roufa","year":"2010","journal-title":"19th USENIX Security Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2502524.2502546"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref25","first-page":"41","article-title":"Infrastructure based authentication in VANETs","volume":"6","author":"chaurasia","year":"2011","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"journal-title":"Location based authentication","year":"2017","author":"hammad","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.134"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2166966.2166971"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511572"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2017.2681462"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/245641"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208543"},{"key":"ref54","first-page":"99","article-title":"Implicit Authentication through Learning User Behavior","volume":"6531","author":"shi","year":"2010","journal-title":"ISC"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2207729"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2009.63"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27659-5_16"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.347-350.2706"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053327"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997513"},{"journal-title":"Multiple factor-based user identification and authentication","year":"2006","author":"scheidt","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15503"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.2297110"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1201\/EBK1439819197","author":"pathan","year":"2016","journal-title":"Security of Self-Organizing Networks MANET WSN WMN VANET"},{"journal-title":"Protocols for Authentication and Key Establishment","year":"2013","author":"boyd","key":"ref3"},{"key":"ref6","first-page":"405","article-title":"How anywhere computing just killed your phone-based two-factor authentication","author":"konoth","year":"2016","journal-title":"Proc of International Conference on Financial Cryptography and Data Security"},{"key":"ref5","first-page":"905","article-title":"From Wax Seals to Hypertext: Electronic Signatures, Contract Formation, and a New Model for Consumer Protection in Internet Transactions","volume":"50","author":"balloon","year":"2001","journal-title":"Emory LJ"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2011.7.1.187"},{"journal-title":"Method and system for monitoring intoxication","year":"2015","author":"nothacker","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"journal-title":"Vehicle occupant weight sensor apparatus","year":"2000","author":"mehney","key":"ref46"},{"journal-title":"Vehicle passenger weight sensor","year":"1998","author":"gioutsos","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435382"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2019156"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2516540.2516567"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457161"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1518\/001872001775870340"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.A0820154"}],"event":{"name":"2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2017,11,6]]},"location":"Munich","end":{"date-parts":[[2017,11,8]]}},"container-title":["2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241503\/8255110\/08255200.pdf?arnumber=8255200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T07:06:32Z","timestamp":1570604792000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8255200\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/icumt.2017.8255200","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}