{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:53:57Z","timestamp":1725731637754},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/netsoft.2016.7502490","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T21:03:38Z","timestamp":1467666218000},"page":"489-495","source":"Crossref","is-referenced-by-count":3,"title":["FassKey: A secure and convenient authentication system"],"prefix":"10.1109","author":[{"given":"John","family":"Milburn","sequence":"first","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SafeCurves Introduction","year":"0","author":"bernstein","key":"ref10"},{"journal-title":"RSA (cryptosystem)","year":"0","key":"ref11"},{"journal-title":"The problem with OAuth for Authentication","year":"2012","author":"bradley","key":"ref12"},{"journal-title":"Security Flaw Found In OAuth 2 0 And OpenID DARKReading","year":"2014","author":"wilson","key":"ref13"},{"journal-title":"Google flaw exposes weakness in two-factor authentication","year":"2013","author":"gonsalves","key":"ref14"},{"journal-title":"Attackers Hit Weak Spots in 2-Factor Authentication","year":"2012","author":"krebs","key":"ref15"},{"key":"ref16","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"1997","journal-title":"IETF RFC 2014"},{"journal-title":"SQRL - An Illustrated Guide","year":"0","author":"cooper","key":"ref17"},{"year":"0","key":"ref18"},{"journal-title":"One Time Password","year":"0","key":"ref19"},{"journal-title":"Information Technology-Automatic Identification and Data Capture Techniques-Bar Code Symbology-QR Code","year":"2000","key":"ref4"},{"journal-title":"SQRL - Secure Quick Reliable Login","year":"2013","author":"gibson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"journal-title":"Galois\/Counter Mode","year":"0","key":"ref5"},{"journal-title":"Elliptic Curve Diffie-Hellman","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"journal-title":"Android Trojan Targets Customers of 20 Major Banks ESET","year":"2016","key":"ref2"},{"journal-title":"The South Korean Fake Banking App Scam Trend Micro","year":"2015","author":"huang","key":"ref1"},{"journal-title":"Things that use Ed25519","year":"0","key":"ref9"}],"event":{"name":"2016 IEEE NetSoft Conference and Workshops (NetSoft)","start":{"date-parts":[[2016,6,6]]},"location":"Seoul, South Korea","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 IEEE NetSoft Conference and Workshops (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7497397\/7502392\/07502490.pdf?arnumber=7502490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T02:10:07Z","timestamp":1475201407000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2016.7502490","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}