{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:22Z","timestamp":1755998842672,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858139","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T14:08:22Z","timestamp":1462457302000},"page":"3761-3766","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["On-Demand Biometrics"],"prefix":"10.1145","author":[{"given":"Christian","family":"Holz","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Frank R.","family":"Bentley","sequence":"additional","affiliation":[{"name":"Yahoo, Sunnyvale, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"volume-title":"Retrieved","year":"2015","author":"Unlock Android Face","key":"e_1_3_2_1_1_1"},{"volume-title":"Retrieved","year":"2015","author":"Apple Touch","key":"e_1_3_2_1_2_1"},{"volume-title":"Retrieved","year":"2015","author":"Authentication Authy","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030135"},{"volume-title":"Retrieved","year":"2015","author":"Security Duo","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"Facebook Login Approvals. May 12 2011. Retrieved September 20 2015 from https:\/\/www.facebook.com\/notes\/facebook-engineering\/introducinglogin-approvals\/10150172618258920  Facebook Login Approvals. May 12 2011. Retrieved September 20 2015 from https:\/\/www.facebook.com\/notes\/facebook-engineering\/introducinglogin-approvals\/10150172618258920"},{"key":"e_1_3_2_1_8_1","unstructured":"Google 2-Step Verification. Retrieved September 20 2015 from https:\/\/www.google.com\/landing\/2step\/  Google 2-Step Verification. Retrieved September 20 2015 from https:\/\/www.google.com\/landing\/2step\/"},{"volume-title":"Retrieved","year":"2015","author":"Backup Codes Google Account","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807458"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702518"},{"volume-title":"Network and Distributed System Security Workshop on Usable Security (USEC '15)","year":"2015","author":"Krol Kat","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912753"},{"key":"e_1_3_2_1_15_1","unstructured":"LinkedIn Two-Step Verification. May 31 2013. Retrieved September 20 2015 from http:\/\/blog.linkedin.com\/2013\/05\/31\/protecting-yourlinkedin-account-with-two-step-verification\/  LinkedIn Two-Step Verification. May 31 2013. Retrieved September 20 2015 from http:\/\/blog.linkedin.com\/2013\/05\/31\/protecting-yourlinkedin-account-with-two-step-verification\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939170.1939200"},{"key":"e_1_3_2_1_17_1","unstructured":"Microsoft Two-step verification. Retrieved September 20 2015 from http:\/\/windows.microsoft.com\/enus\/windows\/two-step-verification-faq  Microsoft Two-step verification. Retrieved September 20 2015 from http:\/\/windows.microsoft.com\/enus\/windows\/two-step-verification-faq"},{"volume-title":"Retrieved","year":"2015","author":"Hello Microsoft Windows","key":"e_1_3_2_1_18_1"},{"volume-title":"Retrieved","year":"2015","author":"Imprint Nexus","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807475"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2012.14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2011100101"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"volume-title":"May 28, 2015. Retrieved","year":"2015","author":"Pichai Sundar","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69812-8_101"},{"volume-title":"Retrieved","year":"2015","author":"Scan Samsung Finger","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420976"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030652.2030664"},{"key":"e_1_3_2_1_30_1","unstructured":"Twitter Login Verification. May 22 2013. Retrieved September 20 2015 from https:\/\/blog.twitter.com\/2013\/getting-started-with-login-verification  Twitter Login Verification. May 22 2013. Retrieved September 20 2015 from https:\/\/blog.twitter.com\/2013\/getting-started-with-login-verification"},{"volume-title":"Retrieved","year":"2015","author":"Two Factor","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"},{"volume-title":"Simple Way to Log In","year":"2015","author":"On-Demand Passwords Yahoo","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"Yahoo Two-step verification. Retrieved September 20 2015 from https:\/\/help.yahoo.com\/kb\/SLN5013.html  Yahoo Two-step verification. Retrieved September 20 2015 from https:\/\/help.yahoo.com\/kb\/SLN5013.html"},{"volume-title":"Retrieved","year":"2015","author":"Key Yahoo Account","key":"e_1_3_2_1_35_1"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Jose California USA","acronym":"CHI'16"},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858139","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:11Z","timestamp":1750222451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858139"}},"subtitle":["Fast Cross-Device Authentication"],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":35,"alternative-id":["10.1145\/2858036.2858139","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858139","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}