{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:52Z","timestamp":1771701232583,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2517881.2517889","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"51-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack"],"prefix":"10.1145","author":[{"given":"Seung-Hyun","family":"Kim","sequence":"first","affiliation":[{"name":"ETRI, Daejeon, South Korea"}]},{"given":"Daeseon","family":"Choi","sequence":"additional","affiliation":[{"name":"ETRI, Daejeon, South Korea"}]},{"given":"Seung-Hun","family":"Jin","sequence":"additional","affiliation":[{"name":"ETRI, Daejeon, South Korea"}]},{"given":"Sung-Hoon","family":"Lee","sequence":"additional","affiliation":[{"name":"ETRI\/UST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PHISHING ATTACKS TRENDS REPORT 4Q2012","author":"Anti-Phishing Working Group","year":"2013","unstructured":"Anti-Phishing Working Group . 2013. PHISHING ATTACKS TRENDS REPORT 4Q2012 . April 2013 . Anti-Phishing Working Group. 2013. PHISHING ATTACKS TRENDS REPORT 4Q2012. April 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"RSA Online Fraud Report","author":"EMC.","year":"2013","unstructured":"RSA EMC. RSA Online Fraud Report . February 2013 . RSA EMC. RSA Online Fraud Report. February 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053327"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1719110.1719138"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314403.1314407"},{"key":"e_1_3_2_1_6_1","volume-title":"The Phishing Guide: Understanding&Preventing Phishing Attacks. IBM Internet Security Systems","author":"Gunter Ollmann","year":"2007","unstructured":"Gunter Ollmann . The Phishing Guide: Understanding&Preventing Phishing Attacks. IBM Internet Security Systems . 2007 . Gunter Ollmann. The Phishing Guide: Understanding&Preventing Phishing Attacks. IBM Internet Security Systems. 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/autopy.org (last accessed","author":"AutoPy Library","year":"2013","unstructured":"AutoPy Library , http:\/\/autopy.org (last accessed : 2013 .07.29) AutoPy Library, http:\/\/autopy.org (last accessed : 2013.07.29)"},{"key":"e_1_3_2_1_8_1","first-page":"2289","author":"Haller N.","year":"1998","unstructured":"Haller , N. , Metz , C. , Nesser , P. and Straw , M. A One-Time Password System, IETF , RFC 2289 , 1998 . Haller, N., Metz, C., Nesser, P. and Straw, M. A One-Time Password System, IETF, RFC 2289, 1998.","journal-title":"RFC"},{"key":"e_1_3_2_1_9_1","volume-title":"RTPH-WP 0904.","author":"SECURITY.","year":"2006","unstructured":"RSA SECURITY. Enhancing One-Time Passwords for Protection Against Real-Time Phishing Attacks , RTPH-WP 0904. 2006 . RSA SECURITY. Enhancing One-Time Passwords for Protection Against Real-Time Phishing Attacks, RTPH-WP 0904. 2006."},{"key":"e_1_3_2_1_10_1","volume-title":"Analysis of current and future phishing attacks on internet banking services. Master Thesis of Technische Universiteit Eindhoven","author":"Stan Hegt","year":"2008","unstructured":"Stan Hegt . Analysis of current and future phishing attacks on internet banking services. Master Thesis of Technische Universiteit Eindhoven . 2008 . Stan Hegt. Analysis of current and future phishing attacks on internet banking services. Master Thesis of Technische Universiteit Eindhoven. 2008."},{"key":"e_1_3_2_1_11_1","first-page":"109","volume-title":"International Conference on Mobile IT Convergence(ICMIC)","author":"Choi K.","year":"2011","unstructured":"Choi , K. , Lee , C. , Jeon , W. , Lee , K. and Won , D . A Mobile Based Anti-Phishing Authentication Scheme using QR code , International Conference on Mobile IT Convergence(ICMIC) , pp. 109 -- 113 . 2011 . Choi, K., Lee, C., Jeon, W., Lee, K. and Won, D. A Mobile Based Anti-Phishing Authentication Scheme using QR code, International Conference on Mobile IT Convergence(ICMIC), pp. 109--113. 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04117-4","volume-title":"Handbook of Information and Communication Security","author":"Stavroulakis P.","year":"2010","unstructured":"Stavroulakis , P. and Stamp , M . Handbook of Information and Communication Security . Springer , Heidelberg . 2010 . Stavroulakis, P. and Stamp, M. Handbook of Information and Communication Security. Springer, Heidelberg. 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"Global Phishing Survey: Trends and Domain Name Use in 2H2012","author":"Anti-Phishing Working Group","year":"2012","unstructured":"Anti-Phishing Working Group . Global Phishing Survey: Trends and Domain Name Use in 2H2012 . 2012 . Anti-Phishing Working Group. Global Phishing Survey: Trends and Domain Name Use in 2H2012. 2012."},{"key":"e_1_3_2_1_16_1","volume-title":"Conference on Mobile Computing, Applications, and Services (MobiCASE 2010","author":"Dodson B.","year":"2010","unstructured":"Dodson , B. , Sengupta , D. , Boneh , D. and Lam , M.S . Secure, Consumer-Friendly Web Authentication and Payments with a Phone . Conference on Mobile Computing, Applications, and Services (MobiCASE 2010 ), Santa Clara, CA, USA. 2010 . Dodson, B., Sengupta, D., Boneh, D. and Lam, M.S. Secure, Consumer-Friendly Web Authentication and Payments with a Phone. Conference on Mobile Computing, Applications, and Services (MobiCASE 2010), Santa Clara, CA, USA. 2010."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"QRP: An improved secure authentication method using QR codes","author":"Maestre P.","year":"2012","unstructured":"Maestre , P. and David . QRP: An improved secure authentication method using QR codes . University of Catalunya . pp. 1 -- 11 . 2012 . Available at http:\/\/openaccess.uoc.edu\/webapps\/o2\/handle\/10609\/14761 (last accessed: 2013. 07. 29) Maestre, P. and David. QRP: An improved secure authentication method using QR codes. University of Catalunya. pp. 1--11. 2012. Available at http:\/\/openaccess.uoc.edu\/webapps\/o2\/handle\/10609\/14761 (last accessed: 2013. 07. 29)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.96"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.8.937-941"},{"key":"e_1_3_2_1_20_1","first-page":"949","volume-title":"A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device","author":"Lee J.","year":"2012","unstructured":"Lee , J. , You , H. , Cho , C. and Jun , M . A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device . The Journal of Korea Information and Communications Society , 37(10), pp. 949 -- 964 . 2012 . Lee, J., You, H., Cho, C. and Jun, M. A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device. The Journal of Korea Information and Communications Society, 37(10), pp.949--964. 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"QR-SSO : Towards a QR-Code based Single Sign-On system","author":"Syamantak M.","year":"2011","unstructured":"Syamantak , M. and David , A . QR-SSO : Towards a QR-Code based Single Sign-On system , International Journal for Digital Society (IJDS) , 2(4), pp583--589. 2011 . Syamantak, M. and David, A. QR-SSO : Towards a QR-Code based Single Sign-On system, International Journal for Digital Society (IJDS), 2(4), pp583--589. 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"Mutual Authentication Protocol for HTTP","author":"Oiwa Y.","year":"2012","unstructured":"Oiwa , Y. , Watanabe , H. , Takagi , H. , Kihara , B. , Hayashi , T. and loku, Y. Mutual Authentication Protocol for HTTP . 2012 . Available at http:\/\/tools.ietf.org\/html\/draft-oiwa-http-mutualauth-12 (last accessed : 2013.07.29) Oiwa, Y., Watanabe, H., Takagi, H., Kihara, B., Hayashi, T. and loku, Y. Mutual Authentication Protocol for HTTP. 2012. Available at http:\/\/tools.ietf.org\/html\/draft-oiwa-http-mutualauth-12 (last accessed : 2013.07.29)"},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/ipinfodb.com (last accessed","author":"Info DB.","year":"2013","unstructured":"IP Info DB. http:\/\/ipinfodb.com (last accessed : 2013 .07.29) IPInfoDB. http:\/\/ipinfodb.com (last accessed: 2013.07.29)"},{"key":"e_1_3_2_1_24_1","volume-title":"http:\/\/tomcat.apache.org\/ (last accessed","author":"Apache Tomcat","year":"2013","unstructured":"Apache Tomcat . http:\/\/tomcat.apache.org\/ (last accessed : 2013 .07.29) Apache Tomcat. http:\/\/tomcat.apache.org\/ (last accessed: 2013.07.29)"},{"key":"e_1_3_2_1_25_1","volume-title":"http:\/\/www.minwon.go.kr (last accessed","author":"Minwon","year":"2013","unstructured":"Minwon 24 , http:\/\/www.minwon.go.kr (last accessed : 2013 .07.29) Minwon 24, http:\/\/www.minwon.go.kr (last accessed: 2013.07.29)"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","location":"Berlin Germany","acronym":"CCS'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2013 ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517881.2517889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517881.2517889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:48Z","timestamp":1750231728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517881.2517889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":25,"alternative-id":["10.1145\/2517881.2517889","10.1145\/2517881"],"URL":"https:\/\/doi.org\/10.1145\/2517881.2517889","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}