{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:30Z","timestamp":1750309590830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723322","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"1089-1094","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EmAc: An authentication method using Email and user activity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2082-6916","authenticated-orcid":false,"given":"Taslimur","family":"Rahman","sequence":"first","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9166-347X","authenticated-orcid":false,"given":"Abhijit","family":"Bhowmik","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180427"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"William Cheswick. 2012. Rethinking Passwords: Our authentication system is lacking. Is improvement possible? Queue 10 12 (2012) 50\u201356.","DOI":"10.1145\/2405116.2422416"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653722"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Sonia Chiasson Elizabeth Stobert Alain Forget Robert Biddle and Paul\u00a0C Van\u00a0Oorschot. 2011. Persuasive cued click-points: Design implementation and evaluation of a knowledge-based authentication mechanism. IEEE transactions on dependable and secure computing 9 2 (2011) 222\u2013235.","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_3_3_1_7_2","first-page":"1","volume-title":"USENIX Security Symposium","author":"Chiasson Sonia","year":"2006","unstructured":"Sonia Chiasson, Paul\u00a0C van Oorschot, and Robert Biddle. 2006. A Usability Study and Critique of Two Password Managers.. In USENIX Security Symposium , Vol.\u00a015. 1\u201316."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6376"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501985"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Simson\u00a0L Garfinkel. 2003. Email-based identification and authentication: An alternative to PKI? IEEE security & privacy 1 6 (2003) 20\u201326.","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"e_1_3_3_1_12_2","unstructured":"Hold Security. 2016. Hold Security Recovers 272 Million Stolen Credentials From A Collector. https:\/\/holdsecurity.com\/news\/2016\/05\/hold-security-recovers-272-million-stolen-credentials-from-a-collector\/ Accessed: 2024-05-14."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2012.13"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357087"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456435"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486017"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2012.9"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2017.8190424"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Robert Morris and Ken Thompson. 1979. Password security: A case history. Commun. ACM 22 11 (1979) 594\u2013597.","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Elizabeth Stobert and Robert Biddle. 2018. The password life cycle. ACM Transactions on Privacy and Security (TOPS) 21 3 (2018) 1\u201332.","DOI":"10.1145\/3183341"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242773"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Susan Wiedenbeck Jim Waters Jean-Camille Birget Alex Brodskiy and Nasir Memon. 2005. PassPoints: Design and longitudinal evaluation of a graphical password system. International journal of human-computer studies 63 1-2 (2005) 102\u2013127.","DOI":"10.1016\/j.ijhcs.2005.04.010"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:48Z","timestamp":1750298208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":21,"alternative-id":["10.1145\/3723178.3723322","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723322","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}