{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:51:25Z","timestamp":1765828285136,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF (National Science Foundation)","award":["TI-2122746"],"award-info":[{"award-number":["TI-2122746"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583642","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"61-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A User Study of Keystroke Dynamics as Second Factor in Web MFA"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4677-5269","authenticated-orcid":false,"given":"Ahmed Anu","family":"Wahab","sequence":"first","affiliation":[{"name":"Clarkson Univeristy, Potsdam, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8401-7157","authenticated-orcid":false,"given":"Daqing","family":"Hou","sequence":"additional","affiliation":[{"name":"Clarkson Univeristy, Potsdam, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9365-9642","authenticated-orcid":false,"given":"Stephanie","family":"Schuckers","sequence":"additional","affiliation":[{"name":"Clarkson Univeristy, Potsdam, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3112540"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.3003988"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS180328016B"},{"key":"e_1_3_2_2_6_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Crawford Heather","year":"2017","unstructured":"Heather Crawford and Ebad Ahmadzadeh. 2017. Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association Santa Clara, 163--173."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/565183"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267670"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"e_1_3_2_2_12_1","volume-title":"IWAISe: First International Workshop on Artificial Intelligence in Security","volume":"59","author":"Maheshwary Saket","year":"2017","unstructured":"Saket Maheshwary, Soumyajit Ganguly, and Vikram Pudi. 2017. Deep secure: A fast and simple neural network based approach for user authentication and identification via keystroke dynamics. In IWAISe: First International Workshop on Artificial Intelligence in Security, Vol. 59."},{"key":"e_1_3_2_2_13_1","volume-title":"it's just annoying!\" A Deep Dive into User Perceptions of Two-Factor Authentication. ACM Transactions on Computer-Human Interaction","author":"Marky Karola","year":"2022","unstructured":"Karola Marky, Kirill Ragozin, George Chernyshov, Andrii Matviienko, Martin Schmitz, Max M\u00fchlh\"auser, Chloe Eghtebas, and Kai Kunze. 2022. \" Nah, it's just annoying!\" A Deep Dive into User Perceptions of Two-Factor Authentication. ACM Transactions on Computer-Human Interaction (2022)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272738"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340120"},{"key":"e_1_3_2_2_17_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 357--370."},{"key":"e_1_3_2_2_18_1","volume-title":"Andrew Beng Jin Teoh, and Shigang Yue","author":"Teh Pin Shen","year":"2013","unstructured":"Pin Shen Teh, Andrew Beng Jin Teoh, and Shigang Yue. 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal , Vol. 2013 (2013)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511516"},{"key":"e_1_3_2_2_20_1","volume-title":"Sigurd Thunem, and Luigi Lo Iacono.","author":"Wiefling Stephan","year":"2022","unstructured":"Stephan Wiefling, Paul Ren\u00e9 J\u00f8rgensen, Sigurd Thunem, and Luigi Lo Iacono. 2022. Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. ACM Transactions on Privacy and Security (2022)."},{"key":"e_1_3_2_2_21_1","first-page":"1","article-title":"A survey on keystroke dynamics biometrics: approaches, advances, and evaluations","volume":"1","author":"Zhong Yu","year":"2015","unstructured":"Yu Zhong and Yunbin Deng. 2015. A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Recent Advances in User Authentication Using Keystroke Dynamics Biometrics 1 (2015), 1--22. io","journal-title":"Recent Advances in User Authentication Using Keystroke Dynamics Biometrics"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Charlotte NC USA","acronym":"CODASPY '23"},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":21,"alternative-id":["10.1145\/3577923.3583642","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583642","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}