{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:43:18Z","timestamp":1775263398812,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infcomw.2014.6849285","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:47:23Z","timestamp":1406648843000},"page":"518-523","source":"Crossref","is-referenced-by-count":23,"title":["MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data"],"prefix":"10.1109","author":[{"given":"Wenyi","family":"Liu","sequence":"first","affiliation":[]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2008.018665"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"18","year":"0"},{"key":"15","year":"0"},{"key":"16","year":"0"},{"key":"13","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"14","year":"0"},{"key":"11","year":"0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"21","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-642-15506-2_15","article-title":"Data fingerprinting with similarity digests","volume":"337","author":"roussev","year":"2010","journal-title":"Advances in Digital Forensics VI"},{"key":"20","year":"0"},{"key":"22","author":"van dijk","year":"2009","journal-title":"Fully Homomorphic Encryption over the Integers"},{"key":"23","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/978-3-642-22792-9_28","article-title":"Fully homomorphic encryption over the integers with shorter public keys","volume":"6841","author":"coron","year":"2011","journal-title":"Proc Advances in Cryptology CRYPTO 2011"},{"key":"24","author":"crane","year":"2012","journal-title":"Simple-homomorphic-encryption"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263955"},{"key":"27","year":"0"},{"key":"28","year":"0"},{"key":"3","year":"0"},{"key":"2","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179540"},{"key":"1","year":"0"},{"key":"7","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1145\/1966913.1966983","article-title":"On mouse dynamics as a behavioral biometric for authentication","author":"jorgensen","year":"2011","journal-title":"Proc of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"6","first-page":"377","article-title":"Next generation biometric security system: An approach for mobile device security","author":"sujithra","year":"2012","journal-title":"Proc of the 2nd ACM International Conference on Computational Science Engineering and Information Technology"},{"key":"5","year":"0"},{"key":"4","first-page":"1","article-title":"A field study of user behavior and perceptions in smartcard authentication","volume":"6949","author":"paul","year":"2011","journal-title":"Human-Computer Interaction INTERACT"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309433"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046725"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,4,27]]},"end":{"date-parts":[[2014,5,2]]}},"container-title":["2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6841218\/6849127\/06849285.pdf?arnumber=6849285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T23:45:48Z","timestamp":1649807148000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6849285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2014.6849285","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}