{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:35:07Z","timestamp":1773174907228,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["653417"],"award-info":[{"award-number":["653417"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["824015"],"award-info":[{"award-number":["824015"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tifs.2019.2958763","type":"journal-article","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T20:40:19Z","timestamp":1576183219000},"page":"2183-2193","source":"Crossref","is-referenced-by-count":18,"title":["Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1729-6808","authenticated-orcid":false,"given":"Kostantinos","family":"Papadamou","sequence":"first","affiliation":[]},{"given":"Steven","family":"Gevers","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Xenakis","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Sirivianos","sequence":"additional","affiliation":[]},{"given":"Savvas","family":"Zannettou","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Chifor","sequence":"additional","affiliation":[]},{"given":"Sorin","family":"Teican","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3877-2826","authenticated-orcid":false,"given":"George","family":"Gugulea","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Caponi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2686-4010","authenticated-orcid":false,"given":"Annamaria","family":"Recupero","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Pisa","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966983"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1145\/2207676.2208544","article-title":"Touch me once and i know it&#x2019;s you!: Implicit authentication based on touch screen patterns","author":"de luca","year":"2012","journal-title":"Proc SIGCHI Conf Hum Factors Comput Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.43"},{"key":"ref37","year":"2018","journal-title":"Continuous Authentication Through Behavioral Biometrics"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9324-6_8"},{"key":"ref35","first-page":"9","article-title":"Implicit authentication for mobile devices","author":"jakobsson","year":"2009","journal-title":"Proc USENIX Conf Hot Topics Secur"},{"key":"ref34","first-page":"99","article-title":"Implicit authentication through learning user behavior","author":"shi","year":"2010","journal-title":"Proc Intl Conf Info Sec"},{"key":"ref10","first-page":"17","article-title":"Stronger password authentication using browser extensions","author":"ross","year":"2005","journal-title":"Proc Usenix Secur Symp"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.92"},{"key":"ref11","year":"2019","journal-title":"LastPass # Password Manager & Vault App"},{"key":"ref12","year":"2019","journal-title":"RoboForm Manage Your Passwords With Ease and Security"},{"key":"ref13","year":"2019","journal-title":"Introducing Mobile Connect&#x2014;The New Standard in Digital Authentication"},{"key":"ref14","year":"2017","journal-title":"Nist&#x2014;Digital Identity Guidelines"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.400"},{"key":"ref16","year":"2019","journal-title":"Industry-Standard Protocol for Authorization"},{"key":"ref17","first-page":"14","article-title":"Privacy postures of authentication technologies","author":"corella","year":"2013","journal-title":"Proc Internet Identity Workshop (IIW)"},{"key":"ref18","author":"hugoo","year":"2017","journal-title":"SS7 SMS-Based Exploit A Wake-Up Call to Shift to Stronger Two-Factor Authentication"},{"key":"ref19","year":"2019","journal-title":"API Exchange Global API Federation Capability"},{"key":"ref28","year":"2019","journal-title":"Liberty Alliance Project"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1179529.1179532","article-title":"OpenID 2.0: A platform for user-centric identity management","author":"recordon","year":"2006","journal-title":"Proc 2nd ACM Workshop Digital Identity Management"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref6","year":"2014","journal-title":"OpenID Connect"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"},{"key":"ref7","year":"2017","journal-title":"FIDO UAF Specification"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"ref9","author":"paquin","year":"2013","journal-title":"U-prove Cryptographic Specification vl l"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"ref22","first-page":"1","article-title":"A usability study and critique of two password managers","volume":"15","author":"chiasson","year":"2006","journal-title":"Proc Usenix Secur Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25867-1_6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_22"},{"key":"ref23","first-page":"1","article-title":"Vulnerability and risk analysis of two commercial browser and cloud based password managers","volume":"1","author":"zhao","year":"2013","journal-title":"ASE Science Journal"},{"key":"ref26","year":"2019","journal-title":"Incommon Identity and Access Management"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref25","year":"2015","journal-title":"Passwordless Authentication"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8833568\/08931622.pdf?arnumber=8931622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:00:55Z","timestamp":1651078855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8931622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/tifs.2019.2958763","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}