{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:53:46Z","timestamp":1775271226692,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363258","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2569-2571","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["simFIDO"],"prefix":"10.1145","author":[{"given":"Dhiman","family":"Chakraborty","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security &amp; Saarland University, Saarbruecken, Germany"}]},{"given":"Sven","family":"Bugiel","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbruecken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Developer Documentation. [n.d.] a. Android keystore system. https:\/\/developer.android.com\/training\/articles\/keystore  Android Developer Documentation. [n.d.] a. Android keystore system. https:\/\/developer.android.com\/training\/articles\/keystore"},{"key":"e_1_3_2_1_2_1","unstructured":"Android Developer Documentation. [n.d.] b. FIDO2 API for Android. https:\/\/developers.google.com\/identity\/fido\/android\/native-apps  Android Developer Documentation. [n.d.] b. FIDO2 API for Android. https:\/\/developers.google.com\/identity\/fido\/android\/native-apps"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_4_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Chakraborty Dhiman","year":"2019"},{"key":"e_1_3_2_1_5_1","volume-title":"Conners and Daniel Zappala","author":"James","year":"2019"},{"key":"e_1_3_2_1_6_1","unstructured":"Sanchari Das Andrew Kim Ben Jelen Joshua Streiff L. Jean Camp and Lesa Huber. 2019. Towards Implementing Inclusive Authentication Technologies for Older Adults. In Who Are You?! Adventures in Authentication Workshop (WAY '19).  Sanchari Das Andrew Kim Ben Jelen Joshua Streiff L. Jean Camp and Lesa Huber. 2019. Towards Implementing Inclusive Authentication Technologies for Older Adults. In Who Are You?! Adventures in Authentication Workshop (WAY '19)."},{"key":"e_1_3_2_1_7_1","unstructured":"FIDO Alliance. 2019 a. Android Now FIDO2 Certified Accelerating Global Migration Beyond Passwords. https:\/\/fidoalliance.org\/android-now-fido2-certified-accelerating-global-migration-beyond-passwords\/  FIDO Alliance. 2019 a. Android Now FIDO2 Certified Accelerating Global Migration Beyond Passwords. https:\/\/fidoalliance.org\/android-now-fido2-certified-accelerating-global-migration-beyond-passwords\/"},{"key":"e_1_3_2_1_8_1","volume-title":"January 30, 2019. https:\/\/fidoalliance.org\/specs\/fido-v2.0-id-20180227\/fido-client-to-authenticator-protocol-v2.0-id-20180227","author":"Alliance FIDO","year":"2019"},{"key":"e_1_3_2_1_9_1","unstructured":"FIDO2 Alliance. [n.d.]. FIDO2: WebAuthn & CTAP. https:\/\/fidoalliance.org\/fido2\/  FIDO2 Alliance. [n.d.]. FIDO2: WebAuthn & CTAP. https:\/\/fidoalliance.org\/fido2\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Security Keys: Practical Cryptographic Second Factors for the Modern Web. In Financial Cryptography.","author":"Lang Juan","year":"2016"},{"key":"e_1_3_2_1_11_1","unstructured":"Robbie MacGregor. 2019. Evaluating the Android Security Key Scheme: An Early Usability Deployability Security Evaluation with Comparative Analysis. In Who Are You?! Adventures in Authentication Workshop (WAY '19).  Robbie MacGregor. 2019. Evaluating the Android Security Key Scheme: An Early Usability Deployability Security Evaluation with Comparative Analysis. In Who Are You?! Adventures in Authentication Workshop (WAY '19)."},{"key":"e_1_3_2_1_12_1","unstructured":"NIST. 2019. Expanding the SIM Card Use for Public Safety Challenge. https:\/\/www.challenge.gov\/challenge\/expanding-the-sim-card-use-for-public-safety-challenge\/.  NIST. 2019. Expanding the SIM Card Use for Public Safety Challenge. https:\/\/www.challenge.gov\/challenge\/expanding-the-sim-card-use-for-public-safety-challenge\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Joshua Reynolds Trevor Smith Ken Reese Luke Dickinson Scott Ruoti and Kent Seamons. 2018. A Tale of Two Studies: The Best and Worst of YubiKey Usability.  Joshua Reynolds Trevor Smith Ken Reese Luke Dickinson Scott Ruoti and Kent Seamons. 2018. A Tale of Two Studies: The Best and Worst of YubiKey Usability.","DOI":"10.1109\/SP.2018.00067"},{"key":"e_1_3_2_1_14_1","volume-title":"Web Authentication: An API for accessing Public Key Credentials Level 1 -- W3C Recommendation","author":"World Wide Web Consortium","year":"2019"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:33Z","timestamp":1750203873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363258"}},"subtitle":["FIDO2 User Authentication with simTPM"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":14,"alternative-id":["10.1145\/3319535.3363258","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363258","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}