{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081437,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134613","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["n-Auth"],"prefix":"10.1145","author":[{"given":"Roel","family":"Peeters","sequence":"first","affiliation":[{"name":"KU Leuven\/COSIC (Belgium)"}]},{"given":"Jens","family":"Hermans","sequence":"additional","affiliation":[{"name":"KU Leuven\/COSIC (Belgium)"}]},{"given":"Pieter","family":"Maene","sequence":"additional","affiliation":[{"name":"KU Leuven\/COSIC (Belgium)"}]},{"given":"Katri","family":"Grenman","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Kimmo","family":"Halunen","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]},{"given":"Juha","family":"H\u00e4iki\u00f6","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre of Finland"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23017"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_7_1","unstructured":"SURFnet bv. 2010. tiqr. (2010). https:\/\/tiqr.org\/  SURFnet bv. 2010. tiqr. (2010). https:\/\/tiqr.org\/"},{"key":"e_1_3_2_1_8_1","volume-title":"LNCS","volume":"2442","author":"Canetti Ran","year":"2002","unstructured":"Ran Canetti and Hugo Krawczyk . 2002 . Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In Advances in Cryptology -- CRYPTO 2002 . LNCS , Vol. 2442 . Springer Berlin Heidelberg, 143--161. Ran Canetti and Hugo Krawczyk. 2002. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In Advances in Cryptology -- CRYPTO 2002. LNCS, Vol. 2442. Springer Berlin Heidelberg, 143--161."},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Mobile Computing, Applications, and Services. Springer, 17--38","author":"Dodson Ben","year":"2010","unstructured":"Ben Dodson , Debangsu Sengupta , Dan Boneh , and Monica S Lam . 2010 . Secure, consumer-friendly web authentication and payments with a phone . In International Conference on Mobile Computing, Applications, and Services. Springer, 17--38 . Ben Dodson, Debangsu Sengupta, Dan Boneh, and Monica S Lam. 2010. Secure, consumer-friendly web authentication and payments with a phone. In International Conference on Mobile Computing, Applications, and Services. Springer, 17--38."},{"key":"e_1_3_2_1_10_1","unstructured":"Steve Gibson. 2013. Secure Quick Reliable Login. (2013). https:\/\/www.grc.com\/sqrl\/sqrl.htm  Steve Gibson. 2013. Secure Quick Reliable Login. (2013). https:\/\/www.grc.com\/sqrl\/sqrl.htm"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804279"},{"volume-title":"Advances in Cryptology -- EUROCRYPT 2001 (LNCS)","author":"Jutla Charanjit S.","key":"e_1_3_2_1_12_1","unstructured":"Charanjit S. Jutla . 2001. Encryption Modes with Almost Free Message Integrity . In Advances in Cryptology -- EUROCRYPT 2001 (LNCS) , Vol. 2045 . Springer , 529--544. Charanjit S. Jutla. 2001. Encryption Modes with Almost Free Message Integrity. In Advances in Cryptology -- EUROCRYPT 2001 (LNCS), Vol. 2045. Springer, 529--544."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2011.55"},{"key":"e_1_3_2_1_14_1","volume-title":"SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. In Advances in Cryptology -- CRYPTO 2003 (LNCS)","author":"Krawczyk Hugo","year":"2003","unstructured":"Hugo Krawczyk . 2003 . SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. In Advances in Cryptology -- CRYPTO 2003 (LNCS) , Vol. 2729 . Springer , 400--425. Hugo Krawczyk. 2003. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. In Advances in Cryptology -- CRYPTO 2003 (LNCS), Vol. 2729. Springer, 400--425."},{"key":"e_1_3_2_1_15_1","volume-title":"FIDO Alliance","author":"Lindemann Rolf","year":"2017","unstructured":"Rolf Lindemann , Eric Tiffany , Davit Baghdasaryan , Dirk Balfanz , Brad Hill , and Jeff Hod . 2017 . FIDO Universal Authentication Framework Protocol. Version 1.1 id-20170202 , FIDO Alliance , February (2017). Rolf Lindemann, Eric Tiffany, Davit Baghdasaryan, Dirk Balfanz, Brad Hill, and Jeff Hod. 2017. FIDO Universal Authentication Framework Protocol. Version 1.1 id-20170202, FIDO Alliance, February (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/77481.77486"},{"key":"e_1_3_2_1_17_1","volume-title":"OCRA: OATH Challenge-Response Algorithm. RFC 6287","author":"M'Raihi D.","year":"2011","unstructured":"D. M'Raihi , J. Rydell , S. Bajaj , S. Machani , and D. Naccache . 2011 . OCRA: OATH Challenge-Response Algorithm. RFC 6287 . RFC Editor. D. M'Raihi, J. Rydell, S. Bajaj, S. Machani, and D. Naccache. 2011. OCRA: OATH Challenge-Response Algorithm. RFC 6287. RFC Editor."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741683"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25867-1_6"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26096-9_21"},{"volume-title":"Security Protocols XXII - 22nd International Workshop (LNCS)","author":"Stajano Frank","key":"e_1_3_2_1_24_1","unstructured":"Frank Stajano , Graeme Jenkinson , Jeunese Payne , Max Spencer , Quentin Stafford-Fraser , and Chris Warrington . 2014. Bootstrapping Adoption of the Pico Password Replacement System . In Security Protocols XXII - 22nd International Workshop (LNCS) , Vol. 8809 . Springer , 172--186. Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, and Chris Warrington. 2014. Bootstrapping Adoption of the Pico Password Replacement System. In Security Protocols XXII - 22nd International Workshop (LNCS), Vol. 8809. Springer, 172--186."},{"key":"e_1_3_2_1_25_1","volume-title":"Technology and Practice of Passwords: International Conference on Passwords, PASSWORDS'14","author":"Stajano Frank","year":"2014","unstructured":"Frank Stajano , Max Spencer , Graeme Jenkinson , and Quentin Stafford-Fraser . 2014 . Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers . In Technology and Practice of Passwords: International Conference on Passwords, PASSWORDS'14 . Springer International Publishing, 61--73. Frank Stajano, Max Spencer, Graeme Jenkinson, and Quentin Stafford-Fraser. 2014. Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers. In Technology and Practice of Passwords: International Conference on Passwords, PASSWORDS'14. Springer International Publishing, 61--73."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.96"},{"key":"e_1_3_2_1_27_1","volume-title":"User Interaction Design for Secure Systems. In 4th International Conference on Information and Communications Security (ICICS '02)","volume":"2513","author":"Yee Ka-Ping","year":"2002","unstructured":"Ka-Ping Yee . 2002 . User Interaction Design for Secure Systems. In 4th International Conference on Information and Communications Security (ICICS '02) (Lecture Notes in Computer Science) , Vol. 2513 . Springer, 278--290. Ka-Ping Yee. 2002. User Interaction Design for Secure Systems. In 4th International Conference on Information and Communications Security (ICICS '02) (Lecture Notes in Computer Science), Vol. 2513. Springer, 278--290."},{"volume-title":"IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 488--493","author":"Zhu B.","key":"e_1_3_2_1_28_1","unstructured":"B. Zhu , X. Fan , and G. Gong . 2014. Loxin: A solution to password-less universal login . In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 488--493 . B. Zhu, X. Fan, and G. Gong. 2014. Loxin: A solution to password-less universal login. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 488--493."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134613","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134613"}},"subtitle":["Mobile Authentication Done Right"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":27,"alternative-id":["10.1145\/3134600.3134613","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134613","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}