{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T16:10:06Z","timestamp":1740931806746,"version":"3.38.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/isspit.2010.5711728","type":"proceedings-article","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T23:06:23Z","timestamp":1297465583000},"page":"73-78","source":"Crossref","is-referenced-by-count":0,"title":["A framework to strengthen password authentication using mobile devices and browser extensions"],"prefix":"10.1109","author":[{"family":"Peipei Shi","sequence":"first","affiliation":[]},{"family":"Bo Zhu","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"222","article-title":"BDD-based cryptanalysis of keystream generators","volume":"2332","author":"krause","year":"2002","journal-title":"Proc of the International Conference on the Theory and Applications of Cryptographic Techniques Advance in Cryptology (Eurocrypt 02)"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","article-title":"Using a personal device to strengthen password authentication from an untrusted computer","volume":"4886","author":"mannan","year":"2007","journal-title":"Financial Cryptography and Data Security"},{"journal-title":"Netcraft toolbar","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11889663_1","article-title":"Phoolproof phishing prevention","volume":"4107","author":"parno","year":"2006","journal-title":"Financial Cryptography and Data Security"},{"key":"ref14","article-title":"A future-adaptable password scheme","author":"provos","year":"1999","journal-title":"Proc of the Annual Conference on USENIX Annual Technical Conference"},{"key":"ref15","first-page":"17","article-title":"Stronger password authentication using browser extensions","author":"ross","year":"2005","journal-title":"Proceedings of the 14th conference on USENIX Security Symposium (USENIX '05)"},{"journal-title":"Spoofstick home","year":"0","key":"ref16"},{"journal-title":"E0 (cipher)","year":"0","key":"ref17"},{"key":"ref18","article-title":"Users are not dependable - How to make security indicators to better protect them","author":"wu","year":"2005","journal-title":"Talk presented at the Workshop for Trustworthy Interfaces for Passwords and Personal Information"},{"key":"ref4","first-page":"238","article-title":"Linear cryptanalysis of bluetooth stream cipher","volume":"2332","author":"golic","year":"2002","journal-title":"Proc of the International Conference on the Theory and Applications of Cryptographic Techniques Advance in Cryptology (Eurocrypt 02)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/3-540-45537-X_3","article-title":"Analysis of the E0 cryptosystem","volume":"2259","author":"fluhrer","year":"2001","journal-title":"Proc 8th Annu Int Workshop on Selected Areas in Cryptography (SAC 2001)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"key":"ref5","first-page":"162","article-title":"Fast algebraic attacks on stream ciphers with linear feedback","volume":"2729","author":"golic","year":"2003","journal-title":"Proc of the International Conference on the Theory and Applications of Cryptographic Techniques Advance in Cryptology (Euro-crypt 03)"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-45353-9_14","article-title":"Security weaknesses in bluetooth","volume":"2020","author":"jakobsson","year":"2001","journal-title":"Proceedings of the 2001 Conference on Topics in Cryptology The Cryptographer's Track at RSA"},{"key":"ref7","article-title":"Trustbar:protecting (even naive) web users from spoofing and phishing attacks","author":"herzberg","year":"2004","journal-title":"Cryptology ePrint Archive"},{"journal-title":"eBay ebay toolbar","year":"0","key":"ref2"},{"key":"ref1","article-title":"Client-side defense against web-based identify theft","author":"chou","year":"2004","journal-title":"Proc of the 11th Annual Network and Distributed System Security Symposium (NDSS '04)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.126"}],"event":{"name":"2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","start":{"date-parts":[[2010,12,15]]},"location":"Luxor, Egypt","end":{"date-parts":[[2010,12,18]]}},"container-title":["The 10th IEEE International Symposium on Signal Processing and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5701811\/5711717\/05711728.pdf?arnumber=5711728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T15:37:05Z","timestamp":1740929825000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5711728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isspit.2010.5711728","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}