{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:53:44Z","timestamp":1756896824000,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2902203"],"award-info":[{"award-number":["2022YFB2902203"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20449","61941105"],"award-info":[{"award-number":["U21A20449","61941105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tdsc.2022.3217259","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:22:38Z","timestamp":1667517758000},"page":"4291-4310","source":"Crossref","is-referenced-by-count":6,"title":["FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol"],"prefix":"10.1109","volume":"20","author":[{"given":"Haonan","family":"Feng","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6135-8052","authenticated-orcid":false,"given":"Jingjing","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3629-0233","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xuesong","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4930-5556","authenticated-orcid":false,"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176946"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"},{"key":"ref15","article-title":"On making U2F protocol leakage-resilient via re-keying","volume":"2017","author":"chang","year":"2017","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2013.379"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ASIAJCIS.2013.25"},{"year":"2017","key":"ref53","article-title":"Web authentication: An API for accessing public key credentials level 1"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_21"},{"key":"ref11","first-page":"467","article-title":"Validation of prouv&#x00E9; protocols using the automatic tool TA4SP","author":"boichut","year":"2006","journal-title":"Proc TaiwAnesth -Fr Conf Informat Technol"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.42.3.1905"},{"article-title":"ProVerif 2.00: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial","year":"2018","author":"blanchet","key":"ref10"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48660-7_29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455787"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0340"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00037"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.25"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61042-1_43"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67639-5_11"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_10"},{"article-title":"What's wrong with fido?","year":"2011","author":"leoutsarakos","key":"ref43"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75650-9_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455828"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1561\/9781680832075"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.39"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"ref40","first-page":"671","article-title":"On the effective prevention of TLS man-in-the-middle attacks in web applications","author":"karapanos","year":"2014","journal-title":"Proc Usenix Secur Symp"},{"year":"2019","key":"ref35","article-title":"FIDO certified products"},{"year":"2018","key":"ref34","article-title":"FIDO authenticator security requirements"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7897543"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2004-123-406"},{"year":"2018","key":"ref31","article-title":"FIDO authenticator allowed cryptography list"},{"year":"2017","key":"ref30","article-title":"FIDO UAF protocol specification"},{"year":"2018","key":"ref33","article-title":"FIDO authenticator metadata requirements"},{"year":"2018","key":"ref32","article-title":"FIDO authenticator allowed restricted operating environments list"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.29007\/xrx7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2014.059325"},{"year":"2017","key":"ref24","article-title":"FIDO AppID and facet specification"},{"year":"2017","key":"ref23","article-title":"Client to authenticator protocol (ctap)"},{"year":"2017","key":"ref26","article-title":"FIDO security reference"},{"year":"2017","key":"ref25","article-title":"FIDO Members"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.035"},{"year":"2017","key":"ref22","article-title":"Android now FIDO2 certified, accelerating global migration beyond passwords"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24363"},{"year":"2017","key":"ref28","article-title":"FIDO UAF authenticator commands"},{"year":"2017","key":"ref27","article-title":"FIDO UAF architectural overview"},{"year":"2017","key":"ref29","article-title":"FIDO UAF authenticator-specific module API"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10236919\/09930658.pdf?arnumber=9930658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T18:46:56Z","timestamp":1695667616000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9930658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":58,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3217259","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}