{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:25:29Z","timestamp":1759091129701},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Science Foundation","award":["CCF-0424422","0842695","0831501 CT-L"],"award-info":[{"award-number":["CCF-0424422","0842695","0831501 CT-L"]}]},{"name":"Air Force Office of Scientific Research through the Multidisciplinary University Research Initiative (MURI)","award":["FA9550-09-1-0539"],"award-info":[{"award-number":["FA9550-09-1-0539"]}]},{"name":"Office of Naval Research through MURI","award":["N000140911081"],"award-info":[{"award-number":["N000140911081"]}]},{"name":"Intel through the Intel Science and Technology Center for Secure Computing"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/tifs.2014.2330311","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T17:36:20Z","timestamp":1403199380000},"page":"1251-1263","source":"Crossref","is-referenced-by-count":17,"title":["On the Security of Trustee-Based Social Authentications"],"prefix":"10.1109","volume":"9","author":[{"given":"Neil Zhenqiang","family":"Gong","sequence":"first","affiliation":[]},{"given":"Di","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398792"},{"key":"ref12","first-page":"547","article-title":"&#x00C9;tude comparative de la distribution florale dans une portion des Alpes et des Jura","volume":"37","author":"jaccard","year":"1901","journal-title":"Bulletin de la Socit Vaudoise des Sciences Naturelles"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref14","article-title":"Social authentication: Harder than it looks","author":"kim","year":"2012","journal-title":"Proc of Financial Cryptography (FC 04)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00325-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397742"},{"key":"ref18","year":"2013","journal-title":"Node Centrality"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69311-6_21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JCIT.1990.128279"},{"key":"ref3","article-title":"The password thicket: Technical and market failures in human authentication on the web","author":"bonneau","year":"2010","journal-title":"Proc of Workshop on the Economics of Information Security (WEIS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OZCHI.1996.560026"},{"key":"ref8","year":"2011","journal-title":"Facebook&#x2019;s Trusted Friends"},{"key":"ref7","year":"2013","journal-title":"Facebook&#x2019;s Trusted Contacts"},{"key":"ref2","year":"2013","journal-title":"BadRank"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866396"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289527"},{"key":"ref21","author":"rice","year":"2011","journal-title":"Facebook&#x2019;s Knowledge-Based Social Authentication"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572580"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397748"},{"key":"ref25","year":"2013","journal-title":"Spam Messages"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6846399\/06832497.pdf?arnumber=6832497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:57:48Z","timestamp":1642006668000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6832497\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":27,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2330311","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}