{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:11Z","timestamp":1750220711715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366424.3382730","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:10:56Z","timestamp":1588579856000},"page":"124-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Keeping Passwords In Your Pocket: Managing Password Locally With Mobile Fingerprint Sensors"],"prefix":"10.1145","author":[{"given":"Pin-Yen","family":"Lin","sequence":"first","affiliation":[{"name":"National Taiwan University"}]},{"given":"Zhong-Yi","family":"Zhou","sequence":"additional","affiliation":[{"name":"National Taiwan University"}]},{"given":"Chun-Ming","family":"Chang","sequence":"additional","affiliation":[{"name":"National Taiwan University"}]},{"given":"Hung-Wei","family":"Chen","sequence":"additional","affiliation":[{"name":"National Taiwan University"}]},{"given":"Shu-Po","family":"Tung","sequence":"additional","affiliation":[{"name":"National Taiwan University"}]},{"given":"Hsu-Chun","family":"Hsiao","sequence":"additional","affiliation":[{"name":"National Taiwan University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accessed: 2020-01-18. 1Password. https:\/\/1password.com.  Accessed: 2020-01-18. 1Password. https:\/\/1password.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Accessed: 2020-01-18. Dashlan. https:\/\/www.dashlane.com\/.  Accessed: 2020-01-18. Dashlan. https:\/\/www.dashlane.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Accessed: 2020-01-18. iCloud - Apple. https:\/\/www.apple.com\/tw\/icloud\/.  Accessed: 2020-01-18. iCloud - Apple. https:\/\/www.apple.com\/tw\/icloud\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Accessed: 2020-01-18. KeePass Password Safe. https:\/\/keepass.info\/.  Accessed: 2020-01-18. KeePass Password Safe. https:\/\/keepass.info\/."},{"volume-title":"Proceedings of Network and Distributed System Security Symposium (NDSS).","author":"Caesar N.","key":"e_1_3_2_1_5_1","unstructured":"M.\u00a0 Caesar N. \u00a0Borisov A. \u00a0 Das , J. \u00a0 Bonneauand X. Wang . 2014. The Tangled Web of Password Reuse . In Proceedings of Network and Distributed System Security Symposium (NDSS). M.\u00a0Caesar N.\u00a0Borisov A.\u00a0Das, J.\u00a0Bonneauand X. Wang. 2014. The Tangled Web of Password Reuse. In Proceedings of Network and Distributed System Security Symposium (NDSS)."},{"volume-title":"Proceedings of IEEE Symposium on Security and Privacy.","author":"Paul C.","key":"e_1_3_2_1_6_1","unstructured":"Paul C. van Oorschot Frank\u00a0Stajano Joseph\u00a0Bonneau, Cormac\u00a0Herley. 2012. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes . In Proceedings of IEEE Symposium on Security and Privacy. Paul C. van Oorschot Frank\u00a0Stajano Joseph\u00a0Bonneau, Cormac\u00a0Herley. 2012. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In Proceedings of IEEE Symposium on Security and Privacy."}],"event":{"name":"WWW '20: The Web Conference 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Taipei Taiwan","acronym":"WWW '20"},"container-title":["Companion Proceedings of the Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366424.3382730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366424.3382730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:12Z","timestamp":1750199592000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366424.3382730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":6,"alternative-id":["10.1145\/3366424.3382730","10.1145\/3366424"],"URL":"https:\/\/doi.org\/10.1145\/3366424.3382730","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}