{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:02:11Z","timestamp":1730318531832,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T00:00:00Z","timestamp":1478736000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,10]]},"DOI":"10.1145\/3003733.3003791","type":"proceedings-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T15:21:17Z","timestamp":1486135277000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Security and Efficiency Analysis of One Time Password Techniques"],"prefix":"10.1145","author":[{"given":"Ioannis","family":"Tzemos","sequence":"first","affiliation":[{"name":"Computer Engineering & Informatics Dept., University of Patras, Greece"}]},{"given":"Apostolos P.","family":"Fournaris","sequence":"additional","affiliation":[{"name":"Computer Informatics and Engineering Dept., TEI of Western Greece, Greece"}]},{"given":"Nicolas","family":"Sklavos","sequence":"additional","affiliation":[{"name":"Computer Engineering & Informatics Dept., University of Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_10"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.39"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"E. De Cristofaro H. Du J. Freudiger and G. Norcie \"A Comparative Usability Study of Two-Factor Authentication\" {Online}. Available: http:\/\/arxiv.org\/abs\/1309.5344 September 2013. E. De Cristofaro H. Du J. Freudiger and G. Norcie \"A Comparative Usability Study of Two-Factor Authentication\" {Online}. Available: http:\/\/arxiv.org\/abs\/1309.5344 September 2013.","DOI":"10.14722\/usec.2014.23025"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27659-5_16"},{"key":"e_1_3_2_1_5_1","first-page":"14","article-title":"Multi-Channel User Authentication Protocol based on Encrypted Hidden OTP","author":"Aboshosha A.","year":"2015","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.275"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/240799.240801"},{"key":"e_1_3_2_1_8_1","unstructured":"Y. S. Lee HyoTaek Lim and HoonJae Lee \"A Study on Efficient OTP Generation using Stream Cipher with Random Digit\" Advanced Communication Technology (ICACT'10) vol. II pp. 1670--1675 February 2010. Y. S. Lee HyoTaek Lim and HoonJae Lee \"A Study on Efficient OTP Generation using Stream Cipher with Random Digit\" Advanced Communication Technology (ICACT'10) vol. II pp. 1670--1675 February 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/353580.353592"},{"key":"e_1_3_2_1_10_1","unstructured":"IETF RFC 4226 HOTP: An HMAC-Based One-Time Password Algorithm Dec. 2005. IETF RFC 4226 HOTP: An HMAC-Based One-Time Password Algorithm Dec. 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.307"},{"key":"e_1_3_2_1_12_1","first-page":"405","article-title":"EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS","volume":"17","author":"Aboshosha A.","year":"2015","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.93"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2002.1046455"},{"volume-title":"proceedings of 14th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS'07)","year":"2007","author":"Sklavos N.","key":"e_1_3_2_1_16_1"}],"event":{"name":"PCI '16: 20th Pan-Hellenic Conference on Informatics","sponsor":["Greek Com Soc Greek Computer Society","TEI Technological Educational Institution of Athens"],"location":"Patras Greece","acronym":"PCI '16"},"container-title":["Proceedings of the 20th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3003733.3003791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T07:13:36Z","timestamp":1673680416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3003733.3003791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,10]]},"references-count":16,"alternative-id":["10.1145\/3003733.3003791","10.1145\/3003733"],"URL":"https:\/\/doi.org\/10.1145\/3003733.3003791","relation":{},"subject":[],"published":{"date-parts":[[2016,11,10]]},"assertion":[{"value":"2016-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}