{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:57:33Z","timestamp":1770220653137,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T00:00:00Z","timestamp":1543968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1565375"],"award-info":[{"award-number":["CNS 1565375"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cisco Research Support","award":["591000"],"award-info":[{"award-number":["591000"]}]},{"name":"Comcast Innovation Fund"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,5]]},"DOI":"10.1145\/3167996.3167997","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"28-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["A qualitative study on usability and acceptability of Yubico security key"],"prefix":"10.1145","author":[{"given":"Sanchari","family":"Das","sequence":"first","affiliation":[{"name":"Indiana University Bloomington, Bloomington, Indiana"}]},{"given":"Gianpaolo","family":"Russo","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, Indiana"}]},{"given":"Andrew C.","family":"Dingman","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, Indiana"}]},{"given":"Jayati","family":"Dev","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, Indiana"}]},{"given":"Olivia","family":"Kenny","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, Indiana"}]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, Indiana"}]}],"member":"320","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"e_1_3_2_1_3_1","volume-title":"WAY@ SOUPS","author":"Ruoti Scott","year":"2016","unstructured":"Scott Ruoti , Jeff Andersen , and Kent E Seamons . Strengthening password-based authentication . In WAY@ SOUPS , 2016 . Scott Ruoti, Jeff Andersen, and Kent E Seamons. Strengthening password-based authentication. In WAY@ SOUPS, 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"Troy Hunt. Password reuse credential stuffing and another billion records in have i been pwned.  Troy Hunt. Password reuse credential stuffing and another billion records in have i been pwned."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Universal 2nd factor (u2f) overview. FIDO Alliance Proposed Standard","author":"Srinivas Sampath","year":"2015","unstructured":"Sampath Srinivas , Dirk Balfanz , Eric Tiffany , and FIDO Alliance . Universal 2nd factor (u2f) overview. FIDO Alliance Proposed Standard , pages 1 -- 5 , 2015 . Sampath Srinivas, Dirk Balfanz, Eric Tiffany, and FIDO Alliance. Universal 2nd factor (u2f) overview. FIDO Alliance Proposed Standard, pages 1--5, 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"Cloud Identity Summit","author":"McDowell Brett","year":"2015","unstructured":"Brett McDowell . Strong authentication canine . Cloud Identity Summit , June 2015 . URL https:\/\/www.youtube.com\/watch?v=sdJ47NFGlgk. Brett McDowell. Strong authentication canine. Cloud Identity Summit, June 2015. URL https:\/\/www.youtube.com\/watch?v=sdJ47NFGlgk."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25867-1_6"},{"key":"e_1_3_2_1_10_1","volume-title":"Security keys: Practical cryptographic second factors for the modern web","author":"Lang Juan","year":"2016","unstructured":"Juan Lang , Alexei Czeskis , Dirk Balfanz , Marius Schilder , and Sampath Srinivas . Security keys: Practical cryptographic second factors for the modern web , 2016 . Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, and Sampath Srinivas. Security keys: Practical cryptographic second factors for the modern web, 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Fagan Michael","year":"2016","unstructured":"Michael Fagan and Mohammad Maifi Hasan Khan . Why do they do what they do?: A study of what motivates users to (not) follow computer security advice . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016) , 2016 . Michael Fagan and Mohammad Maifi Hasan Khan. Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357143"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.95"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium","volume":"99","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J Doug Tygar . Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In USENIX Security Symposium , volume 99 , 1999 . Alma Whitten and J Doug Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In USENIX Security Symposium, volume 99, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2146303.2146317"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23022"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"e_1_3_2_1_19_1","volume-title":"WEIS","author":"Grossklags Jens","year":"2007","unstructured":"Jens Grossklags and Alessandro Acquisti . When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information . In WEIS , 2007 . Jens Grossklags and Alessandro Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In WEIS, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"V. Garg and J. Camp. Heuristics and biases: Implications for security design. 32 (1):73--79. ISSN 0278-0097.  V. Garg and J. Camp. Heuristics and biases: Implications for security design. 32 (1):73--79. ISSN 0278-0097.","DOI":"10.1109\/MTS.2013.2241294"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330320"},{"key":"e_1_3_2_1_22_1","first-page":"199","volume-title":"Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA","author":"Rajivan Prashanth","year":"2016","unstructured":"Prashanth Rajivan , Pablo Moriano , Timothy Kelley , and Jean Camp . What can johnny do?-factors in an end-user expertise instrument . In Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016 ), page 199 . Lulu.com. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and Jean Camp. What can johnny do?-factors in an end-user expertise instrument. In Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), page 199. Lulu.com."},{"key":"e_1_3_2_1_23_1","volume-title":"Top Applications of Yubico","author":"Compare","year":"2017","unstructured":"Compare yubikeys --- strong two-factor authentication for secure logins . Top Applications of Yubico , June 2017 . URL https:\/\/www.yubico.com\/products\/yubikey-hardware\/compare-yubikeys\/. {Online; accessed 3-Oct-2017}. Compare yubikeys --- strong two-factor authentication for secure logins. Top Applications of Yubico, June 2017. URL https:\/\/www.yubico.com\/products\/yubikey-hardware\/compare-yubikeys\/. {Online; accessed 3-Oct-2017}."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858265"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti Laura Brandimarte and George Loewenstein. Privacy and human behavior in the age of information. 347(6221):509--514. URL htp:\/\/science.sciencemag.org\/content\/347\/6221\/509.short.  Alessandro Acquisti Laura Brandimarte and George Loewenstein. Privacy and human behavior in the age of information. 347(6221):509--514. URL htp:\/\/science.sciencemag.org\/content\/347\/6221\/509.short.","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872155"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.3"},{"key":"e_1_3_2_1_29_1","unstructured":"Use security key for 2-step verification - android. URL https:\/\/support.google.com\/accounts\/answer\/6103523?hl=en&ref_topic=6103521.  Use security key for 2-step verification - android. URL https:\/\/support.google.com\/accounts\/answer\/6103523?hl=en&ref_topic=6103521."},{"key":"e_1_3_2_1_30_1","volume-title":"Why johnny can't blow the whistle: Identifying and reducing usability issues in anonymity systems","author":"Norcie Greg","unstructured":"Greg Norcie , Jim Blythe , Kelly Caine , and L. Jean Camp . Why johnny can't blow the whistle: Identifying and reducing usability issues in anonymity systems . Internet Society . ISBN 978-1-891562-37-2. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why johnny can't blow the whistle: Identifying and reducing usability issues in anonymity systems. Internet Society. ISBN 978-1-891562-37-2."},{"key":"e_1_3_2_1_31_1","volume-title":"Financial Cryptography and Data Security","author":"Lang Juan","year":"2016","unstructured":"Juan Lang , Alexei Czeskis , Dirk Balfanz , Marius Schilder , and Sampath Srinivas . Security keys: Practical cryptographic second factors for the modern web . In Financial Cryptography and Data Security . International Financial Cryptography Association , February 2016 . URL http:\/\/fc16.ifca.ai\/preproceedings\/25_Lang.pdf. Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, and Sampath Srinivas. Security keys: Practical cryptographic second factors for the modern web. In Financial Cryptography and Data Security. International Financial Cryptography Association, February 2016. URL http:\/\/fc16.ifca.ai\/preproceedings\/25_Lang.pdf."}],"event":{"name":"STAST2017: 7th International Workshop on Socio-Technical Aspects in Security and Trust","location":"Orlando Florida USA","acronym":"STAST2017"},"container-title":["Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3167997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167996.3167997","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167996.3167997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:07Z","timestamp":1750213567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3167997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,5]]},"references-count":30,"alternative-id":["10.1145\/3167996.3167997","10.1145\/3167996"],"URL":"https:\/\/doi.org\/10.1145\/3167996.3167997","relation":{},"subject":[],"published":{"date-parts":[[2018,12,5]]},"assertion":[{"value":"2018-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}