{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T14:59:58Z","timestamp":1769353198258,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T00:00:00Z","timestamp":1429574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004966","name":"European Commission","doi-asserted-by":"publisher","award":["HOME\/2011\/ISEC\/AG\/INT\/4000002166"],"award-info":[{"award-number":["HOME\/2011\/ISEC\/AG\/INT\/4000002166"]}],"id":[{"id":"10.13039\/501100004966","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["608533, 317631"],"award-info":[{"award-number":["608533, 317631"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,21]]},"DOI":"10.1145\/2751323.2751327","type":"proceedings-article","created":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T12:40:32Z","timestamp":1428928832000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Two-factor authentication: is the world ready?"],"prefix":"10.1145","author":[{"given":"Thanasis","family":"Petsas","sequence":"first","affiliation":[{"name":"Foundation for Research and Technology---Hellas (FORTH), Greece"}]},{"given":"Giorgos","family":"Tsirantonakis","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology---Hellas (FORTH), Greece"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology---Hellas (FORTH), Greece"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology---Hellas (FORTH), Greece"}]}],"member":"320","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon mechanical turk. https:\/\/www.mturk.com\/.  Amazon mechanical turk. https:\/\/www.mturk.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Casperjs. http:\/\/casperjs.org\/.  Casperjs. http:\/\/casperjs.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Death by captcha. http:\/\/www.deathbycaptcha.com.  Death by captcha. http:\/\/www.deathbycaptcha.com."},{"key":"e_1_3_2_1_4_1","unstructured":"Gmail now has 425 million active users. http:\/\/www.theverge.com\/2012\/6\/28\/3123643\/gmail-425-million-total-users.  Gmail now has 425 million active users. http:\/\/www.theverge.com\/2012\/6\/28\/3123643\/gmail-425-million-total-users."},{"key":"e_1_3_2_1_5_1","unstructured":"Most common user agents. http:\/\/techblog.willshouse.com\/2012\/01\/03\/most-common-user-agents\/.  Most common user agents. http:\/\/techblog.willshouse.com\/2012\/01\/03\/most-common-user-agents\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Rumola. http:\/\/skipinput.com\/.  Rumola. http:\/\/skipinput.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Two factor auth (2fa) -- list of websites and whether or not they support 2fa. https:\/\/twofactorauth.org\/.  Two factor auth (2fa) -- list of websites and whether or not they support 2fa. https:\/\/twofactorauth.org\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_1_9_1","unstructured":"Blog G. O. Advanced sign-in security for your google account. http:\/\/googleblog.blogspot.gr\/2011\/02\/advanced-sign-in-security-for-your.html.  Blog G. O. Advanced sign-in security for your google account. http:\/\/googleblog.blogspot.gr\/2011\/02\/advanced-sign-in-security-for-your.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Blog G. O. S. Strengthening 2-step verification with security key. http:\/\/googleonlinesecurity.blogspot.gr\/2014\/10\/strengthening-2-step-verification-with.html.  Blog G. O. S. Strengthening 2-step verification with security key. http:\/\/googleonlinesecurity.blogspot.gr\/2014\/10\/strengthening-2-step-verification-with.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Blog O. O. S. Cleaning up after password dumps. http:\/\/googleonlinesecurity.blogspot.gr\/2014\/09\/cleaning-up-after-password-dumps.html.  Blog O. O. S. Cleaning up after password dumps. http:\/\/googleonlinesecurity.blogspot.gr\/2014\/09\/cleaning-up-after-password-dumps.html."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium","author":"Bonneau J.","year":"2014","unstructured":"Bonneau , J. , and Schechter , S . Towards reliable storage of 56-bit secrets in human memory . In USENIX Security Symposium ( 2014 ). Bonneau, J., and Schechter, S. Towards reliable storage of 56-bit secrets in human memory. In USENIX Security Symposium (2014)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242656"},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Human-Computer Interaction (HCI)","author":"Brostoff S.","year":"2000","unstructured":"Brostoff , S. , and Sasse , A. M . Are passfaces more usable than passwords? In International Conference on Human-Computer Interaction (HCI) ( 2000 ). Brostoff, S., and Sasse, A. M. Are passfaces more usable than passwords? In International Conference on Human-Computer Interaction (HCI) (2000)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408790"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium","author":"Chiasson S.","year":"2006","unstructured":"Chiasson , S. , van Oorschot , P. C. , and Biddle , R . A usability study and critique of two password managers . In USENIX Security Symposium ( 2006 ). Chiasson, S., van Oorschot, P. C., and Biddle, R. A usability study and critique of two password managers. In USENIX Security Symposium (2006)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23025"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_3_2_1_23_1","unstructured":"Google. About 2-step verification. https:\/\/support.google.com\/accounts\/answer\/180744.  Google. About 2-step verification. https:\/\/support.google.com\/accounts\/answer\/180744."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.162"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"key":"e_1_3_2_1_27_1","unstructured":"Hill K. Google says not to worry about 5 million gmail passwords leaked. http:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/09\/11\/google-says-not-to-worry-about-5-million-gmail-passwords-leaked\/.  Hill K. Google says not to worry about 5 million gmail passwords leaked. http:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/09\/11\/google-says-not-to-worry-about-5-million-gmail-passwords-leaked\/."},{"key":"e_1_3_2_1_28_1","volume-title":"Wired Magazine","author":"Honan M.","year":"2012","unstructured":"Honan , M. How apple and amazon security flaws led to my epic hacking . Wired Magazine , August 2012 . http:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/. Honan, M. How apple and amazon security flaws led to my epic hacking. Wired Magazine, August 2012. http:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516746"},{"key":"e_1_3_2_1_30_1","volume-title":"Does two factor authentication actually weaken security? https:\/\/ramblingrant.co.uk\/does-two-factor-authentication-actually-weaken-security\/ (and private communication","author":"Paul Moore","year":"2014","unstructured":"Paul Moore . Does two factor authentication actually weaken security? https:\/\/ramblingrant.co.uk\/does-two-factor-authentication-actually-weaken-security\/ (and private communication in October 2014 ). Paul Moore. Does two factor authentication actually weaken security? https:\/\/ramblingrant.co.uk\/does-two-factor-authentication-actually-weaken-security\/ (and private communication in October 2014)."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium","author":"Ross B.","year":"2005","unstructured":"Ross , B. , Jackson , C. , Miyake , N. , Boneh , D. , and Mitchell , J. C . Stronger password authentication using browser extensions . In USENIX Security Symposium ( 2005 ). Ross, B., Jackson, C., Miyake, N., Boneh, D., and Mitchell, J. C. Stronger password authentication using browser extensions. In USENIX Security Symposium (2005)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"}],"event":{"name":"EuroSys '15: Tenth EuroSys Conference 2015","location":"Bordeaux France","acronym":"EuroSys '15","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Eighth European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751323.2751327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751323.2751327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:07Z","timestamp":1750225387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751323.2751327"}},"subtitle":["quantifying 2FA adoption"],"short-title":[],"issued":{"date-parts":[[2015,4,21]]},"references-count":34,"alternative-id":["10.1145\/2751323.2751327","10.1145\/2751323"],"URL":"https:\/\/doi.org\/10.1145\/2751323.2751327","relation":{},"subject":[],"published":{"date-parts":[[2015,4,21]]},"assertion":[{"value":"2015-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}