{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T12:22:33Z","timestamp":1725711753198},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,18]]},"DOI":"10.1109\/ieem58616.2023.10406725","type":"proceedings-article","created":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T13:26:51Z","timestamp":1706794011000},"page":"0279-0283","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Non-Biometric Multi-Factor Authentication System Using Audios and Relationships"],"prefix":"10.1109","author":[{"given":"Joaquin","family":"Zermeno-Saldana","sequence":"first","affiliation":[{"name":"Tecnologico de Monterrey, School of Engineering and Sciences,Monterrey,NL,Mexico,64849"}]},{"given":"Jesus Arturo","family":"Perez-Diaz","sequence":"additional","affiliation":[{"name":"Tecnologico de Monterrey, School of Engineering and Sciences,Monterrey,NL,Mexico,64849"}]}],"member":"263","reference":[{"volume-title":"Cybersecurity: Reality Check. Avast","year":"2018","author":"MOSHER","key":"ref1"},{"key":"ref2","article-title":"Most common passwords 2022","volume-title":"Cybernews","author":"Meyer","year":"2022"},{"volume-title":"The mathematics of (hacking) passwords. Scientific American","year":"2019","author":"Delahaye","key":"ref3"},{"article-title":"The knowledge-based authentication attacks. In Proceedings of the International Conference on Security and Management (SAM) (p. 1)","volume-title":"The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)","author":"Towhidi","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app10082961"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3440712"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2016.84"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3516809"},{"key":"ref9","article-title":"How good are we at memorizing and recognizing voices?","volume-title":"Atlas of Science. Atlas of Science","author":"Aglieri","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cub.2010.12.033"},{"volume-title":"How to determine the entropy of a password? Baeldung on Computer Science","year":"2022","author":"Datta","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s13023-018-0948-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3069164"}],"event":{"name":"2023 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","start":{"date-parts":[[2023,12,18]]},"location":"Singapore, Singapore","end":{"date-parts":[[2023,12,21]]}},"container-title":["2023 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10406295\/10406217\/10406725.pdf?arnumber=10406725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T13:26:33Z","timestamp":1706880393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10406725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,18]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ieem58616.2023.10406725","relation":{},"subject":[],"published":{"date-parts":[[2023,12,18]]}}}