{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:55Z","timestamp":1750220395979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,26]]},"DOI":"10.1145\/3486011.3486489","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T02:09:47Z","timestamp":1640052587000},"page":"437-441","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Two-step verification in the teaching \/ learning process"],"prefix":"10.1145","author":[{"given":"Ang\u00e9lica","family":"Gonz\u00e1lez Arrieta","sequence":"first","affiliation":[{"name":"Universidad de Salamanca, Spain"}]},{"given":"Daniel","family":"L\u00f3pez-S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca, Spain"}]},{"given":"Pastora I.","family":"Vega Cruz","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca, Spain"}]},{"given":"\u00c1ngel L.","family":"S\u00e1nchez L\u00e1zaro","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca, Spain"}]},{"given":"Bel\u00e9n","family":"P\u00e9rez Lancho","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca, Spain"}]},{"given":"Juan A.","family":"Hern\u00e1ndez Sim\u00f3n","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca, Spain"}]},{"given":"Jos\u00e9 R.","family":"Garc\u00eda-Bermejo-Giner","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca, Spain"}]}],"member":"320","published-online":{"date-parts":[[2021,12,20]]},"reference":[{"volume-title":"t. E. U. l. EUR-Lex, \u00abDirective (EU) 2015\/2366 of the European Parliament and of the Council of","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"A. t. E. U. l. EUR-Lex, \u00abDirective (EU) 2015\/2366 of the European Parliament and of the Council of November 25, 2015 ,\u00bb 25 November 2015. [En l\u00ednea]. Available: https:\/\/eur-lex.europa.eu\/legal-content\/ES\/TXT\/?uri=celex%3A32015L2366. A. t. E. U. l. EUR-Lex, \u00abDirective (EU) 2015\/2366 of the European Parliament and of the Council of November 25, 2015,\u00bb 25 November 2015. [En l\u00ednea]. Available: https:\/\/eur-lex.europa.eu\/legal-content\/ES\/TXT\/?uri=celex%3A32015L2366."},{"key":"e_1_3_2_1_2_1","unstructured":"A. FIDO \u00abslideshare \u00bb 2021. [En l\u00ednea]. Available: https:\/\/www.slideshare.net\/FIDOAlliance\/presentations.  A. FIDO \u00abslideshare \u00bb 2021. [En l\u00ednea]. Available: https:\/\/www.slideshare.net\/FIDOAlliance\/presentations."},{"volume-title":"\u00abSimpler and stronger authentication,\u00bb","year":"2009","key":"e_1_3_2_1_3_1","unstructured":"A. FIDO , \u00abSimpler and stronger authentication,\u00bb 2009 . [En l\u00ednea]. Available: https:\/\/fidoalliance.org\/. A. FIDO, \u00abSimpler and stronger authentication,\u00bb 2009. [En l\u00ednea]. Available: https:\/\/fidoalliance.org\/."},{"volume-title":"a. Help, \u00abUsing a security key for two-step verification,\u00bb","year":"2021","key":"e_1_3_2_1_4_1","unstructured":"G. a. Help, \u00abUsing a security key for two-step verification,\u00bb 2021 . [En l\u00ednea]. Available: https:\/\/support.google.com\/accounts\/answer\/6103523?co=GENIE.Platform%3DAndroid&hl=es. G. a. Help, \u00abUsing a security key for two-step verification,\u00bb 2021. [En l\u00ednea]. Available: https:\/\/support.google.com\/accounts\/answer\/6103523?co=GENIE.Platform%3DAndroid&hl=es."},{"volume-title":"h. service, \u00abWhat is a security key and how does it work?,\u00bb","year":"2021","key":"e_1_3_2_1_5_1","unstructured":"F. h. service, \u00abWhat is a security key and how does it work?,\u00bb 2021 . [En l\u00ednea]. Available: https:\/\/es-la.facebook.com\/help\/401566786855239. F. h. service, \u00abWhat is a security key and how does it work?,\u00bb 2021. [En l\u00ednea]. Available: https:\/\/es-la.facebook.com\/help\/401566786855239."},{"key":"e_1_3_2_1_6_1","volume-title":"\u00abHow to enable two-step verification,\u00bb","author":"Dropbox","year":"2021","unstructured":"Dropbox , \u00abHow to enable two-step verification,\u00bb 2021 . [En l\u00ednea]. Available: https:\/\/www.dropbox.com\/es_ES\/help\/security\/enable-two-step-verification#2falsecurity-keys. Dropbox, \u00abHow to enable two-step verification,\u00bb 2021. [En l\u00ednea]. Available: https:\/\/www.dropbox.com\/es_ES\/help\/security\/enable-two-step-verification#2falsecurity-keys."},{"key":"e_1_3_2_1_7_1","volume-title":"\u00abUse your phone's built-in security key,\u00bb","author":"Google","year":"2021","unstructured":"Google , \u00abUse your phone's built-in security key,\u00bb 2021 . [En l\u00ednea]. Available: https:\/\/support.google.com\/accounts\/answer\/9289445?co=GENIE.Platform%3DAndroid&oco=0. Google, \u00abUse your phone's built-in security key,\u00bb 2021. [En l\u00ednea]. Available: https:\/\/support.google.com\/accounts\/answer\/9289445?co=GENIE.Platform%3DAndroid&oco=0."},{"key":"e_1_3_2_1_8_1","unstructured":"Google \u00abSafety \u00bb 2021. [En l\u00ednea]. Available: https:\/\/myaccount.google.com\/security.  Google \u00abSafety \u00bb 2021. [En l\u00ednea]. Available: https:\/\/myaccount.google.com\/security."},{"key":"e_1_3_2_1_9_1","unstructured":"Cloudentify 2021. [En l\u00ednea]. Available: https:\/\/u2f.cloudentify.com\/u2fdemo\/.  Cloudentify 2021. [En l\u00ednea]. Available: https:\/\/u2f.cloudentify.com\/u2fdemo\/."}],"event":{"name":"TEEM'21: Ninth International Conference on Technological Ecosystems for Enhancing Multiculturality","acronym":"TEEM'21","location":"Barcelona Spain"},"container-title":["Ninth International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM'21)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486011.3486489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486011.3486489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:44Z","timestamp":1750191524000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486011.3486489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":9,"alternative-id":["10.1145\/3486011.3486489","10.1145\/3486011"],"URL":"https:\/\/doi.org\/10.1145\/3486011.3486489","relation":{},"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"2021-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}