{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:15:43Z","timestamp":1771024543689,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3636102","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"215-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["OLIVE: Flexible, Portable, and Sustainable V2X Multi-Factor Authentication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2706-2936","authenticated-orcid":false,"given":"Marco","family":"De Vincenzi","sequence":"first","affiliation":[{"name":"IIT-CNR, Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0586-9333","authenticated-orcid":false,"given":"Chiara","family":"Bodei","sequence":"additional","affiliation":[{"name":"Universita di Pisa, Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5936-8470","authenticated-orcid":false,"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[{"name":"IIT-CNR, Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014038"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0881-0"},{"key":"e_1_3_2_1_3_1","volume-title":"More than a Password. https:\/\/www.cisa.gov\/MFA. Last accessed","author":"CISA.","year":"2023","unstructured":"CISA. 2023. More than a Password. https:\/\/www.cisa.gov\/MFA. Last accessed: Dec. 12, 2023."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\/multifactor-authentication. Last accessed","author":"Multifactor Authentication CISA.","year":"2023","unstructured":"CISA. 2023. Multifactor Authentication. https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\/multifactor-authentication. Last accessed: Dec. 12, 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"Talos shares insights related to recent cyber attack on Cisco. https:\/\/blog.talosintelligence.com\/recent-cyber-attack. Last accessed","year":"2023","unstructured":"Cisco. 2023. Talos shares insights related to recent cyber attack on Cisco. https:\/\/blog.talosintelligence.com\/recent-cyber-attack. Last accessed: Dec. 12, 2023."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3217358"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"FIDO.","year":"2023","unstructured":"FIDO. 2023. FIDO Alliance. Retrieved September 13, 2023 from https:\/\/fidoalliance.org\/fido2\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937182"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"e_1_3_2_1_10_1","volume-title":"Green Algorithms: Quantifying the carbon emissions of computation. CoRR abs\/2007.07610","author":"Lannelongue Lo\u00efc","year":"2020","unstructured":"Lo\u00efc Lannelongue, Jason Grealey, and Michael Inouye. 2020. Green Algorithms: Quantifying the carbon emissions of computation. CoRR abs\/2007.07610 (2020). arXiv:2007.07610 https:\/\/arxiv.org\/abs\/2007.07610"},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Lannelongue Lo\u00efc","year":"2023","unstructured":"Lo\u00efc Lannelongue, Jason Grealey, and Michael Inouye. 2023. Green Algorithms. Retrieved September 13, 2023 from http:\/\/calculator.green-algorithms.org\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2017.8255200"},{"key":"e_1_3_2_1_13_1","volume-title":"Data breach turns out to be more elaborate than suspected. https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/twilio-data-breach-turns-out-to-be-more-elaborate-than-suspected. Last accessed","year":"2023","unstructured":"Twilio. 2023. Data breach turns out to be more elaborate than suspected. https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/twilio-data-breach-turns-out-to-be-more-elaborate-than-suspected. Last accessed: Dec. 12, 2023."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/www.un.org\/en\/academic-impact\/sustainability. Last accessed","author":"United Nations. 2023. Sustainability.","year":"2023","unstructured":"United Nations. 2023. Sustainability. https:\/\/www.un.org\/en\/academic-impact\/sustainability. Last accessed: Dec. 12, 2023."},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Vigan\u00f2 Luca","year":"2023","unstructured":"Luca Vigan\u00f2. 2023. Fairy Tales of AI and Cybersecurity. Retrieved September 13, 2023 from https:\/\/www.kcl.ac.uk\/events\/fairy-tales-of-ai-and-cybersecurity"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0393-x"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4070283"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","location":"Avila Spain","acronym":"SAC '24","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3636102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:00Z","timestamp":1750291440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":17,"alternative-id":["10.1145\/3605098.3636102","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3636102","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}