{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:21:57Z","timestamp":1725657717030},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/pccc.2013.6742763","type":"proceedings-article","created":{"date-parts":[[2014,2,21]],"date-time":"2014-02-21T16:21:28Z","timestamp":1392999688000},"page":"1-2","source":"Crossref","is-referenced-by-count":10,"title":["Secure user authentication in cloud computing management interfaces"],"prefix":"10.1109","author":[{"given":"Liliana F. B.","family":"Soares","sequence":"first","affiliation":[]},{"given":"Diogo A. B.","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Mario M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Pedro R. M.","family":"Inacio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"1","article-title":"Looking inside the (Drop) box","author":"kholia","year":"2013","journal-title":"USENIX Workshop on Offensive Technologies (WOOT)"},{"journal-title":"Twitter's 2FA SMS Double-duty","year":"2013","author":"hypponnen","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"journal-title":"Channel-Bound Cookies","year":"2012","author":"balfanz","key":"5"},{"journal-title":"XFA","year":"0","key":"4"}],"event":{"name":"2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2013,12,6]]},"location":"San Diego, CA","end":{"date-parts":[[2013,12,8]]}},"container-title":["2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6733443\/6742746\/06742763.pdf?arnumber=6742763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T16:56:49Z","timestamp":1580921809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6742763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/pccc.2013.6742763","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}