{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:34:15Z","timestamp":1774438455690,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61772466"],"award-info":[{"award-number":["61772466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U1836202"],"award-info":[{"award-number":["U1836202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars","doi-asserted-by":"publisher","award":["LR19F020003"],"award-info":[{"award-number":["LR19F020003"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Zhejiang, China","award":["2017C01055"],"award-info":[{"award-number":["2017C01055"]}]},{"name":"Alibaba-ZJU Joint Research Institute of Frontier Technologies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/jiot.2019.2944301","type":"journal-article","created":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T03:18:16Z","timestamp":1569640696000},"page":"5745-5759","source":"Crossref","is-referenced-by-count":41,"title":["THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1420-2047","authenticated-orcid":false,"given":"Liming","family":"Fang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3473-6943","authenticated-orcid":false,"given":"Xinyu","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-372X","authenticated-orcid":false,"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3656-0328","authenticated-orcid":false,"given":"Zehong","family":"Cao","sequence":"additional","affiliation":[]},{"given":"M.","family":"Tanveer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078835"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484318"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.46"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2009.544"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.317"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449432"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TechSym.2014.6807906"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"ref40","year":"2018","journal-title":"Fingerprint Unlock Can Also Be Broken"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1556262.1556312"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"ref13","article-title":"No tech hacking a guide to social engineering","author":"long","year":"2008","journal-title":"Dumpster Diving and Shoulder Surfing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2270227"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"ref17","year":"2018","journal-title":"Your Phone Is Being Secretly Monitored So That Others Can See Everything on the Screen"},{"key":"ref18","author":"sheng","year":"2018","journal-title":"Discover the Most Powerful Android Spyware Skygofree"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.07.256"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/UBICOMM.2008.76"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSICSSE.2015.7369239"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_29"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2374352"},{"key":"ref8","first-page":"1","article-title":"Cryptanalysis of password authentication schemes: Current status and key issues","author":"sood","year":"2010","journal-title":"Proc International Conf on Methods and Models in Computer Science"},{"key":"ref7","first-page":"221","article-title":"Offline dictionary attack on password authentication schemes using smart cards","author":"ding","year":"2015","journal-title":"Proc ISCAS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3758\/BF03331011"},{"key":"ref1","year":"2018","journal-title":"iPhone Has Taken the Fight to 3D Printing by Easily Cracking Android&#x2019;s Face Recognition Feature"},{"key":"ref20","author":"conger","year":"2017","journal-title":"Uber&#x2019;s IoS App Had Secret Permissions That Allowed It to Copy Your Phone Screen"},{"key":"ref45","first-page":"1","article-title":"Human-seeded attacks and exploiting hot-spots in graphical passwords","author":"thorpe","year":"2007","journal-title":"Proc Usenix Security Symp"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"ref21","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","author":"aviv","year":"2010","journal-title":"Proc 4th USENIX Conf Offens Technol"},{"key":"ref42","year":"2019","journal-title":"Biometric Authentication Under Threat Liveness Detection Hacking"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23292"},{"key":"ref41","year":"2018","journal-title":"iPhone Has Taken the Fight to 3D Printing by Easily Cracking Android&#x2019;s Face Recognition Feature"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.006"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2539942"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2312547"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.012"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9138535\/08851192.pdf?arnumber=8851192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:26:45Z","timestamp":1651080405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8851192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":45,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2944301","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}