{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:10:37Z","timestamp":1759133437121,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61628202"],"award-info":[{"award-number":["61628202"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176946","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"155-157","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Secure Display for FIDO Transaction Confirmation"],"prefix":"10.1145","author":[{"given":"Yongxian","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xinluo","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Arizona State University, Tucson, AZ, USA"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing , China"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM. 2016. ARM Architecture Reference Manual ARMv8 for ARMv8-A architecture profile. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0487a.k\/index.html. (2016).  ARM. 2016. ARM Architecture Reference Manual ARMv8 for ARMv8-A architecture profile. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0487a.k\/index.html. (2016)."},{"key":"e_1_3_2_1_2_1","unstructured":"Justin Lee. 2017. FIDO Alliance announces new round of FIDO certified products. (2017). http:\/\/www.biometricupdate.com\/201710\/fido-alliance-announces-new-round-of-fido-certified-products  Justin Lee. 2017. FIDO Alliance announces new round of FIDO certified products. (2017). http:\/\/www.biometricupdate.com\/201710\/fido-alliance-announces-new-round-of-fido-certified-products"},{"key":"e_1_3_2_1_3_1","volume":"201","author":"Lindemann Rolf","unstructured":"Rolf Lindemann , Davit Baghdasaryan , Eric Tiffany , D Balfanz , B Hill , and J Hodges. 201 4. FIDO UAF Protocol Specification v1. 0. FIDO Alliance (2014). Rolf Lindemann, Davit Baghdasaryan, Eric Tiffany, D Balfanz, B Hill, and J Hodges. 2014. FIDO UAF Protocol Specification v1. 0. FIDO Alliance (2014).","journal-title":"J Hodges."},{"key":"e_1_3_2_1_4_1","volume-title":"FIDO UAF Architectural Overview. FIDO Alliance","author":"Machani Salah","year":"2014","unstructured":"Salah Machani , Rob Philpott , Sampath Srinivas , John Kemp , and Jeff Hodges . 2014. FIDO UAF Architectural Overview. FIDO Alliance ( 2014 ). Salah Machani, Rob Philpott, Sampath Srinivas, John Kemp, and Jeff Hodges. 2014. FIDO UAF Architectural Overview. FIDO Alliance (2014)."},{"key":"e_1_3_2_1_5_1","volume-title":"FIDO Alliance","author":"Srinivas Sampath","year":"2014","unstructured":"Sampath Srinivas , Dirk Balfanz , and Eric Tiffany . 2014 . FIDO Universal 2nd Factor (U2F) Overview. Version v1. 0-rd-20140209 , FIDO Alliance , February (2014). Sampath Srinivas, Dirk Balfanz, and Eric Tiffany. 2014. FIDO Universal 2nd Factor (U2F) Overview. Version v1. 0-rd-20140209, FIDO Alliance, February (2014)."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":5,"alternative-id":["10.1145\/3176258.3176946","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176946","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}