{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:30Z","timestamp":1750220670025,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,16]]},"DOI":"10.1145\/3451471.3451503","type":"proceedings-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T22:20:59Z","timestamp":1626214859000},"page":"199-205","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Survey on Multi-Factor Authentication Methods for Mobile Devices"],"prefix":"10.1145","author":[{"given":"Stephen","family":"Mujeye","sequence":"first","affiliation":[{"name":"Illinois State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129534"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"An Y. (2012). Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards.\u00a0Journal of Biomedicine & Biotechnology \u00a02012 519723\u2013519726. https:\/\/doi.org\/10.1155\/2012\/519723.  An Y. (2012). Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards.\u00a0Journal of Biomedicine & Biotechnology \u00a02012 519723\u2013519726. https:\/\/doi.org\/10.1155\/2012\/519723.","DOI":"10.1155\/2012\/519723"},{"volume-title":"Security Analysis and Improvement of a Multi-Factor Biometric-Based Remote Authentication Scheme.\u00a0IAENG International Journal of Computer Science,\u00a046(4)","year":"2019","author":"Boonkrong S.","key":"e_1_3_2_1_3_1"},{"volume-title":"Empirical Results of Password Strength and Cognitive Load. Online Journal of Applied Knowledge Management","year":"2016","author":"Mujeye S","key":"e_1_3_2_1_4_1"},{"volume-title":"Robust Multi-Factor Authentication for Fragile Communications. \u00a0IEEE Transactions on Dependable and Secure Computing, 11(6), 568-581, doi: 10.1109\/TDSC.2013.2297110","year":"2014","author":"Huang X.","key":"e_1_3_2_1_5_1"},{"volume-title":"A Pattern-Based Multi-Factor Authentication System.\u00a0Scalable Computing. Practice and Experience,\u00a020(1), 101\u2013112. https:\/\/doi.org\/10.12694\/scpe.v20i1.1460","year":"2019","author":"Pankhuri","key":"e_1_3_2_1_6_1"},{"volume-title":"Empirical assessment of mobile device users","year":"2019","author":"Giwah W.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Chin A. G. Little P. & Jones B. H. (2020). An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University.\u00a0International Journal of Education & Development Using Information & Communication Technology \u00a016(1) 44\u201361.  Chin A. G. Little P. & Jones B. H. (2020). An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University.\u00a0International Journal of Education & Development Using Information & Communication Technology \u00a016(1) 44\u201361."},{"volume-title":"Switzerland), 17(9)","year":"2017","author":"Ehatisham","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","first-page":"070426","article-title":"A Survey on Security for Smartphone Device","volume":"2016","author":"Zaidi S. F.","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications(IJACSA), 7(4), http:\/\/dx.doi.org\/10.14569\/IJACSA."},{"volume-title":"Retrieved","year":"2016","author":"Heisler Y.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gerinurse.2013.02.005"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351243"},{"volume-title":"Press touch code: A finger press based screen size independent authentication scheme for smart devices.\u00a0PLoS ONE,\u00a012(10), 1\u201320. https:\/\/doi-org.libproxy.lib.ilstu.edu\/10.1371\/journal.pone.0186940","year":"2017","author":"Ranak M. S. A. N.","key":"e_1_3_2_1_14_1"},{"volume-title":"Evaluating authentication options for mobile health applications in younger and older adults.\u00a0PLoS ONE,\u00a013(1), 1\u201316. https:\/\/doi-org.libproxy.lib.ilstu.edu\/10.1371\/journal.pone.0189048","year":"2018","author":"Grindrod K.","key":"e_1_3_2_1_15_1"},{"volume-title":"A Cross-Layer Biometric Recognition System for Mobile IoT Devices.\u00a0Electronics (Basel),\u00a07(2), 26\u2013. https:\/\/doi.org\/10.3390\/electronics7020026","year":"2018","author":"Taheri Y.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4965-6"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Gupta E. Agrwal M. & Sivakumar R. (2020). Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals.\u00a0ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 1\u20136. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148741.  Gupta E. Agrwal M. & Sivakumar R. (2020). Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals.\u00a0ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 1\u20136. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148741.","DOI":"10.1109\/ICC40277.2020.9148741"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000044"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2190-8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58808-7_7"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2005100103"}],"event":{"name":"ICSIM 2021: 2021 The 4th International Conference on Software Engineering and Information Management","acronym":"ICSIM 2021","location":"Yokohama Japan"},"container-title":["2021 The 4th International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451471.3451503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3451471.3451503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:59Z","timestamp":1750197779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3451471.3451503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":22,"alternative-id":["10.1145\/3451471.3451503","10.1145\/3451471"],"URL":"https:\/\/doi.org\/10.1145\/3451471.3451503","relation":{},"subject":[],"published":{"date-parts":[[2021,1,16]]},"assertion":[{"value":"2021-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}