{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:15:12Z","timestamp":1759133712087,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/jsyst.2017.2691550","type":"journal-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:04:44Z","timestamp":1493067884000},"page":"3279-3290","source":"Crossref","is-referenced-by-count":5,"title":["A Novel and Robust Authentication Factor Based on Network Communications Latency"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3880-5125","authenticated-orcid":false,"given":"Zuochao","family":"Dou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7660-9512","authenticated-orcid":false,"given":"Issa","family":"Khalil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1583-713X","authenticated-orcid":false,"given":"Abdallah","family":"Khreishah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1018"},{"article-title":"Outflanking and securely using the PIN\/TAN-system","year":"2004","author":"wiesmaier","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref31","first-page":"543","article-title":"A look at targeted attacks through the lense of an NGO","author":"le blond","year":"2014","journal-title":"Proc Usenix Security Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2007.46"},{"journal-title":"Near Field Communication (NFC) From Theory to Practice","year":"2011","author":"coskun","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.162"},{"year":"2010","key":"ref35","article-title":"RSA securid"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2007.82"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046677"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00059-X"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592455"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"year":"2017","key":"ref13","article-title":"Anti-phishing extension: Netcraft"},{"year":"2010","key":"ref14","article-title":"Gmail: Detecting suspicious account activity"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23035"},{"key":"ref17","article-title":"Breaking HTTPS with BGP hijacking","author":"gavrichenkov","year":"2015","journal-title":"Proc Black Hat Briefings"},{"key":"ref18","first-page":"15","article-title":"Address authenticaion","volume":"16","author":"hogg","year":"2013","journal-title":"Internet Protocol J"},{"key":"ref19","article-title":"Universal 2nd factor (U2F) overview","author":"srinivas","year":"2013","journal-title":"FIDO Alliance Proposed Standard"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2013.03.013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504771"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/computers3010001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.114"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1248656"},{"key":"ref5","article-title":"Fingerprints on mobile devices: Abusing and leaking","author":"zhang","year":"2015","journal-title":"Proc Black Hat Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557579"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88623-5_40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2246036.2254400"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2300499"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897925"},{"key":"ref20","first-page":"671","article-title":"On the effective prevention of TLS man-in-the-middle attacks in web applications","author":"karapanos","year":"2014","journal-title":"Proc Usenix Security Symp"},{"year":"2013","key":"ref22","article-title":"e-Handbook of statistical methods"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-5906-5_796","article-title":"Trusted platform module","author":"morris","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637232"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029210"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/90.731185"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2669908"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347426"},{"key":"ref43","first-page":"105","article-title":"TPM-based authentication mechanism for Apache Hadoop","author":"khalil","year":"2014","journal-title":"International Conference on Security and Privacy in Communication Systems"},{"article-title":"A study of internet routing stability using link weight","year":"2008","author":"lad","key":"ref25"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/8543256\/07907300.pdf?arnumber=7907300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:01Z","timestamp":1642004941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7907300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2017.2691550","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}