{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:38:02Z","timestamp":1774949882724,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3700868","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"211-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6110-6446","authenticated-orcid":false,"family":"Kalash","sequence":"first","affiliation":[{"name":"National Institute of Technology Karnataka Surathkal (India), Surathkal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1985-0297","authenticated-orcid":false,"given":"Bishakh Chandra","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur (India), Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8166-2847","authenticated-orcid":false,"given":"Sourav Kanti","family":"Addya","sequence":"additional","affiliation":[{"name":"National Institute of Technology Karnataka Surathkal (India), Surathkal, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2024. crypto-js. https:\/\/github.com\/brix\/crypto-js Accessed: 2024\/10\/28 11:17:06."},{"key":"e_1_3_3_1_3_2","unstructured":"2024. Etherscan. https:\/\/etherscan.io\/blocks Accessed: 2024\/10\/28 11:17:06."},{"key":"e_1_3_3_1_4_2","unstructured":"2024. Implementation for Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication Approach. https:\/\/github.com\/Kalash1110\/Enhancing-Security-in-Smart-Contract-Wallets-An-OTP-Based-2-Factor-Authentication-Approach Accessed: 2024\/10\/28 11:17:06."},{"key":"e_1_3_3_1_5_2","unstructured":"2024. Metamask. https:\/\/github.com\/MetaMask\/metamask-extension\/"},{"key":"e_1_3_3_1_6_2","unstructured":"2024. Microsoft Authenticator. https:\/\/support.microsoft.com\/en-us\/account-billing\/set-up-an-authenticator-app-as-a-two-step-verification-method-2db39828-15e1-4614-b825-6e2b524e7c95 Accessed: 2024\/10\/28 11:17:06."},{"key":"e_1_3_3_1_7_2","unstructured":"2024. Sepolia testnet. https:\/\/sepolia.etherscan.io\/ Accessed: 2024\/10\/28 11:17:06."},{"key":"e_1_3_3_1_8_2","unstructured":"2024. Solidity. https:\/\/github.com\/ethereum\/solidity"},{"key":"e_1_3_3_1_9_2","unstructured":"2024. web3.js. https:\/\/github.com\/web3\/web3.js\/releases\/tag\/v4.0.1-rc.1 Accessed: 2024\/10\/28 11:17:06."},{"key":"e_1_3_3_1_10_2","unstructured":"Elaine Barker and Quynh Dang. 2020. Nist special publication 800\u201357 part 1 revision 5: Recommendation for key management: Part 1-general May 2020. Cited on (2020) 58."},{"key":"e_1_3_3_1_11_2","volume-title":"Binance Security Breach Update","year":"2019","unstructured":"Binance. 2019. Binance Security Breach Update. Technical Report. https:\/\/binance.zendesk. com\/hc\/en-us\/articles\/360028031711-Binance-Security-Breach-Update"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Syeda\u00a0Tayyaba Bukhari Muhammad\u00a0Umar Janjua and Junaid Qadir. 2024. Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique. IEEE Open Journal of the Computer Society (2024).","DOI":"10.1109\/OJCS.2024.3398794"},{"key":"e_1_3_3_1_13_2","volume-title":"Brain Wallets Are Not Secure and \u2018No One Should Use Them","author":"Buntinx Jean-Pierre","year":"2016","unstructured":"Jean-Pierre Buntinx. 2016. Brain Wallets Are Not Secure and \u2018No One Should Use Them. Technical Report. https:\/\/news.bitcoin.com\/ brain-wallets-not-secure-no-one-use-says-study\/"},{"key":"e_1_3_3_1_14_2","volume-title":"Proof of stake: The making of Ethereum and the philosophy of blockchains","author":"Buterin Vitalik","year":"2022","unstructured":"Vitalik Buterin. 2022. Proof of stake: The making of Ethereum and the philosophy of blockchains. Seven Stories Press."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2011.5958480"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00222"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_8"},{"key":"e_1_3_3_1_18_2","volume-title":"RFC Internet-Draft: BLS signature","author":"S.\u00a0Wahby Sergey\u00a0Gorbunov Dan\u00a0Boneh, Riad","year":"2019","unstructured":"Sergey\u00a0Gorbunov Dan\u00a0Boneh, Riad S.\u00a0Wahby. 2019. RFC Internet-Draft: BLS signature. Technical Report. https:\/\/tools.ietf.org\/html\/draft-irtf-cfrg-bls-signature-00"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.669"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_8"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.64"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_13"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Li Gong. 1989. Using one-way functions for authentication. ACM SIGCOMM Computer Communication Review 19 5 (1989) 8\u201311.","DOI":"10.1145\/74681.74682"},{"key":"e_1_3_3_1_24_2","unstructured":"Vipul Goyal. 2004. How to re-initialize a hash chain. Cryptology ePrint Archive (2004)."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1760"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423257"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_29"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133989"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Massimo La\u00a0Morgia Alessandro Mei Francesco Sassi and Julinda Stefa. 2023. The doge of wall street: Analysis and detection of pump and dump cryptocurrency manipulations. ACM Transactions on Internet Technology 23 1 (2023) 1\u201328.","DOI":"10.1145\/3561300"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Leslie Lamport. 1981. Password authentication with insecure communication. Commun. ACM 24 11 (1981) 770\u2013772.","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_3_1_31_2","unstructured":"Frank\u00a0T Leighton and Silvio Micali. 1995. Large provably fast and secure digital signature schemes based on secure hash functions. US Patent 5 432 852."},{"key":"e_1_3_3_1_32_2","unstructured":"Pat Litke and Joe Stewart. 2014. The cryptocurrency-stealing malware landscape. Secureworks (Feb 2014). https:\/\/www.secureworks.com\/research\/cryptocurrency-stealing-malware-landscape"},{"key":"e_1_3_3_1_33_2","unstructured":"Ephrat Livni. 2022. Binance blockchain hit by $570 million hack exposing crypto vulnerabilities. The New York Times (Oct 2022). https:\/\/www.nytimes.com\/2022\/10\/07\/business\/binance-hack.html"},{"key":"e_1_3_3_1_34_2","first-page":"218","volume-title":"Conference on the Theory and Application of Cryptology","author":"Merkle Ralph\u00a0C","year":"1989","unstructured":"Ralph\u00a0C Merkle. 1989. A certified digital signature. In Conference on the Theory and Application of Cryptology. Springer, 218\u2013238."},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_3"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4226"},{"key":"e_1_3_3_1_37_2","volume-title":"TOTP: Time-Based One-Time Password Algorithm","author":"M\u2019Raihi David","year":"2011","unstructured":"David M\u2019Raihi, Johan Rydell, Mingliang Pei, and Salah Machani. 2011. TOTP: Time-Based One-Time Password Algorithm. RFC 6238. Network Working Group, Internet Engineering Task Force (IETF). https:\/\/www.rfc-editor.org\/rfc\/rfc6238.html"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Sabout Nagaraju and Latha Parthiban. 2015. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway. Journal of Cloud Computing 4 (2015) 1\u201323.","DOI":"10.1186\/s13677-015-0046-4"},{"key":"e_1_3_3_1_39_2","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2016.7939528"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Arthur\u00a0AB Pessa Matja\u017e Perc and Haroldo\u00a0V Ribeiro. 2023. Age and market capitalization drive large price variations of cryptocurrencies. Scientific reports 13 1 (2023) 3351.","DOI":"10.1038\/s41598-023-30431-3"},{"key":"e_1_3_3_1_42_2","unstructured":"Reuters. 2016. Bitcoin Worth $72M Was Stolen in Bitfinex Exchange Hack in Hong Kong. The Reuters (Aug 2016). https:\/\/fortune.com\/2016\/08\/03\/bitcoin-stolen-bitfinex-hack-hong-kong\/"},{"key":"e_1_3_3_1_43_2","volume-title":"SecureEnvoy Overview Presentation","year":"2017","unstructured":"SecurEnvoy. 2017. SecureEnvoy Overview Presentation. Technical Report. https:\/\/www.securenvoy.com\/animations\/overview\/animations.shtm\/oneswipe"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23167"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.96"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Anton Wahrst\u00e4tter Jor\u00e3o Gomes Sajjad Khan and Davor Svetinovic. 2023. Improving cryptocurrency crime detection: Coinjoin community detection approach. IEEE Transactions on Dependable and Secure Computing 20 6 (2023) 4946\u20134956.","DOI":"10.1109\/TDSC.2023.3238412"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524629"},{"key":"e_1_3_3_1_48_2","unstructured":"Gavin Wood et\u00a0al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper (2014). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","location":"Hyderabad India","acronym":"ICDCN 2025"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3700868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3700868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3700868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":47,"alternative-id":["10.1145\/3700838.3700868","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3700868","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}