{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:13:15Z","timestamp":1730326395647,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"vor","delay-in-days":30,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["OAC-2139358, CNS-2201465 and CNS-2152669"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.1145\/3558482.3590183","type":"proceedings-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T16:10:08Z","timestamp":1687968608000},"page":"175-186","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0002-4136-7004","authenticated-orcid":false,"given":"Ahmed Tanvir","family":"Mahdad","sequence":"first","affiliation":[{"name":"Texas A&M University, College Station, TX, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6083-104X","authenticated-orcid":false,"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"Texas A&M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931218621262"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_27"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"volume-title":"Annual international cryptology conference","author":"Bellare Mihir","key":"e_1_3_2_2_4_1","unstructured":"Mihir Bellare and Phillip Rogaway . 1993. Entity authentication and key distribution . In Annual international cryptology conference . Springer , 232--249. Mihir Bellare and Phillip Rogaway. 1993. Entity authentication and key distribution. In Annual international cryptology conference. Springer, 232--249."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v14i1.9"},{"volume-title":"Markku Antikainen, Viswanathan Manihatty Bojan, and Tuomas Aura.","year":"2018","author":"Bui Thanh","key":"e_1_3_2_2_7_1","unstructured":"Thanh Bui , Siddharth Prakash Rao , Markku Antikainen, Viswanathan Manihatty Bojan, and Tuomas Aura. 2018 . Man-in-the-machine: exploiting ill-secured communication inside the computer. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1511--1525. Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, and Tuomas Aura. 2018. Man-in-the-machine: exploiting ill-secured communication inside the computer. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1511--1525."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11213-007-9082-4"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0303-9"},{"volume-title":"Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$","year":"2019","author":"Ciolino St\u00e9phane","key":"e_1_3_2_2_11_1","unstructured":"St\u00e9phane Ciolino , Simon Parkin , and Paul Dunphy . 2019 . Of Two Minds about Two-Factor: Understanding Everyday $$FIDO$$ U2F Usability through Device Comparison and Experience Sampling . In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019). St\u00e9phane Ciolino, Simon Parkin, and Paul Dunphy. 2019. Of Two Minds about Two-Factor: Understanding Everyday $$FIDO$$ U2F Usability through Device Comparison and Experience Sampling. In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019)."},{"key":"e_1_3_2_2_12_1","unstructured":"Comodo Group Inc. 2020. What is Zeus Trojan ? | How the Zeus Virus infects the computers? https:\/\/enterprise.comodo.com\/blog\/what-is-zeus-trojan\/. Comodo Group Inc. 2020. What is Zeus Trojan ? | How the Zeus Virus infects the computers? https:\/\/enterprise.comodo.com\/blog\/what-is-zeus-trojan\/."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_9"},{"volume-title":"A comparative usability study of two-factor authentication. arXiv preprint arXiv:1309.5344","year":"2013","author":"Cristofaro Emiliano De","key":"e_1_3_2_2_14_1","unstructured":"Emiliano De Cristofaro , Honglu Du , Julien Freudiger , and Greg Norcie . 2013. A comparative usability study of two-factor authentication. arXiv preprint arXiv:1309.5344 ( 2013 ). Emiliano De Cristofaro, Honglu Du, Julien Freudiger, and Greg Norcie. 2013. A comparative usability study of two-factor authentication. arXiv preprint arXiv:1309.5344 (2013)."},{"key":"e_1_3_2_2_15_1","article-title":"SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES","volume":"18","author":"Dmitrienko Alexandra","year":"2014","unstructured":"Alexandra Dmitrienko , Christopher Liebchen , Christian Rossow , and Ahmad-Reza Sadeghi . 2014 . SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES . Intel Technology Journal , Vol. 18 , 4 (2014). Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. 2014. SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES. Intel Technology Journal , Vol. 18, 4 (2014).","journal-title":"Intel Technology Journal"},{"volume-title":"International Symposium on Security in Computing and Communication. Springer, 183--210","year":"2018","author":"Drake Chris","key":"e_1_3_2_2_16_1","unstructured":"Chris Drake and Praveen Gauravaram . 2018 . Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution . In International Symposium on Security in Computing and Communication. Springer, 183--210 . Chris Drake and Praveen Gauravaram. 2018. Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution. In International Symposium on Security in Computing and Communication. Springer, 183--210."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2013.6750207"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2011.63"},{"volume-title":"Symposium on Network and Distributed System Security. 151--157","year":"1994","author":"Haller Neil M","key":"e_1_3_2_2_19_1","unstructured":"Neil M Haller . 1994 . The s\/key (tm) one-time password system . In Symposium on Network and Distributed System Security. 151--157 . Neil M Haller. 1994. The s\/key (tm) one-time password system. In Symposium on Network and Distributed System Security. 151--157."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241574"},{"volume-title":"Computer communications","year":"1999","author":"Harris Brendon","key":"e_1_3_2_2_21_1","unstructured":"Brendon Harris and Ray Hunt . 1999. TCP\/ IP security threats and attack methods. Computer communications , Vol. 22 , 10 ( 1999 ), 885--897. Brendon Harris and Ray Hunt. 1999. TCP\/IP security threats and attack methods. Computer communications , Vol. 22, 10 (1999), 885--897."},{"volume-title":"Social Engineering Resistant 2FA. arXiv preprint arXiv:2001.06075","year":"2020","author":"Jakobsson Markus","key":"e_1_3_2_2_22_1","unstructured":"Markus Jakobsson . 2020. Social Engineering Resistant 2FA. arXiv preprint arXiv:2001.06075 ( 2020 ). Markus Jakobsson. 2020. Social Engineering Resistant 2FA. arXiv preprint arXiv:2001.06075 (2020)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_15"},{"volume-title":"24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15). 483--498.","author":"Karapanos Nikolaos","key":"e_1_3_2_2_24_1","unstructured":"Nikolaos Karapanos , Claudio Marforio , Claudio Soriente , and Srdjan Capkun . 2015. Sound-proof: usable two-factor authentication based on ambient sound . In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15). 483--498. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15). 483--498."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3e.2018.8632643"},{"volume-title":"Proceedings of the 2nd USENIX Security Workshop. 5--14","year":"1990","author":"Klein Daniel V","key":"e_1_3_2_2_26_1","unstructured":"Daniel V Klein . 1990 . Foiling the cracker: A survey of, and improvements to, password security . In Proceedings of the 2nd USENIX Security Workshop. 5--14 . Daniel V Klein. 1990. Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Security Workshop. 5--14."},{"volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 405--421","author":"Konoth Radhesh Krishnan","key":"e_1_3_2_2_27_1","unstructured":"Radhesh Krishnan Konoth , Victor van der Veen, and Herbert Bos. 2016. How anywhere computing just killed your phone-based two-factor authentication . In International Conference on Financial Cryptography and Data Security. Springer, 405--421 . Radhesh Krishnan Konoth, Victor van der Veen, and Herbert Bos. 2016. How anywhere computing just killed your phone-based two-factor authentication. In International Conference on Financial Cryptography and Data Security. Springer, 405--421."},{"volume-title":"Security of mobile TAN on smartphones. A risk analysis for the iOS and Android smartphone platforms. Master's thesis","year":"2012","author":"Koot Laurens","key":"e_1_3_2_2_28_1","unstructured":"Laurens Koot . 2012. Security of mobile TAN on smartphones. A risk analysis for the iOS and Android smartphone platforms. Master's thesis , Radboud University Nijmegen ( 2012 ). Laurens Koot. 2012. Security of mobile TAN on smartphones. A risk analysis for the iOS and Android smartphone platforms. Master's thesis, Radboud University Nijmegen (2012)."},{"volume-title":"Emiliano De Cristofaro, and M Angela Sasse","year":"2015","author":"Krol Kat","key":"e_1_3_2_2_29_1","unstructured":"Kat Krol , Eleni Philippou , Emiliano De Cristofaro, and M Angela Sasse . 2015 . \"They brought in the horrible key ring thing!\" Analysing the Usability of Two-Factor Authentication in UK Online Banking . arXiv preprint arXiv:1501.04434 (2015). Kat Krol, Eleni Philippou, Emiliano De Cristofaro, and M Angela Sasse. 2015. \"They brought in the horrible key ring thing!\" Analysing the Usability of Two-Factor Authentication in UK Online Banking. arXiv preprint arXiv:1501.04434 (2015)."},{"key":"e_1_3_2_2_30_1","first-page":"107","article-title":"Password in practice: An usability survey","volume":"2","author":"Kumar Naveen","year":"2011","unstructured":"Naveen Kumar . 2011 . Password in practice: An usability survey . Journal of Global Research in Computer Science , Vol. 2 , 5 (2011), 107 -- 112 . Naveen Kumar. 2011. Password in practice: An usability survey. Journal of Global Research in Computer Science, Vol. 2, 5 (2011), 107--112.","journal-title":"Journal of Global Research in Computer Science"},{"volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 422--440","year":"2016","author":"Lang Juan","key":"e_1_3_2_2_31_1","unstructured":"Juan Lang , Alexei Czeskis , Dirk Balfanz , Marius Schilder , and Sampath Srinivas . 2016 . Security keys: Practical cryptographic second factors for the modern web . In International Conference on Financial Cryptography and Data Security. Springer, 422--440 . Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, and Sampath Srinivas. 2016. Security keys: Practical cryptographic second factors for the modern web. In International Conference on Financial Cryptography and Data Security. Springer, 422--440."},{"volume-title":"Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ?, 132--140","year":"2019","author":"Lu H Karen","key":"e_1_3_2_2_32_1","unstructured":"H Karen Lu , Asad Ali , Benoit Famechon , and Najam Siddiqui . 2019 . Out-of-Band Authentication Using 2-Factor Image Matching . In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ?, 132--140 . H Karen Lu, Asad Ali, Benoit Famechon, and Najam Siddiqui. 2019. Out-of-Band Authentication Using 2-Factor Image Matching. In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ?, 132--140."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2019327"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_11"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium","year":"2009","author":"McCune Jonathan M","key":"e_1_3_2_2_35_1","unstructured":"Jonathan M McCune . 2009 . Safe passage for passwords and other sensitive data . In Proceedings of the Network and Distributed System Security Symposium , 2009. Jonathan M McCune. 2009. Safe passage for passwords and other sensitive data. In Proceedings of the Network and Distributed System Security Symposium, 2009."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.4018\/jhisi.2007070104"},{"volume-title":"2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML","year":"2017","author":"Meier Joshua","key":"e_1_3_2_2_37_1","unstructured":"Joshua Meier , Jesse Zhang , Richard Zou , and James Mickens . 2017 . Zero-effort Two-factor Authentication using Audio Signals . In 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2017). 10. Joshua Meier, Jesse Zhang, Richard Zou, and James Mickens. 2017. Zero-effort Two-factor Authentication using Audio Signals. In 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2017). 10."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_9"},{"key":"e_1_3_2_2_40_1","unstructured":"R Niruban. [n. d.]. User Authentication Scheme for Security and Privacy in Social Networks Using Brightpass Method. Journal of Current Research in Engineering and Science ( [n. d.]) 34. R Niruban. [n. d.]. User Authentication Scheme for Security and Privacy in Social Networks Using Brightpass Method. Journal of Current Research in Engineering and Science ( [n. d.]) 34."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2307331"},{"volume-title":"Proceeding of the 16th annual network and distributed system security Symposium.","author":"McCune Adrian Perrig Jonathan M","key":"e_1_3_2_2_42_1","unstructured":"Jonathan M McCune Adrian Perrig and Michael K Reiter . 2009. Safe passage for passwords and other sensitive data . In Proceeding of the 16th annual network and distributed system security Symposium. Jonathan M McCune Adrian Perrig and Michael K Reiter. 2009. Safe passage for passwords and other sensitive data. In Proceeding of the 16th annual network and distributed system security Symposium."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00013"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEED.2016.7863247"},{"volume-title":"Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$","year":"2019","author":"Reese Ken","key":"e_1_3_2_2_46_1","unstructured":"Ken Reese , Trevor Smith , Jonathan Dutson , Jonathan Armknecht , Jacob Cameron , and Kent Seamons . 2019 . A usability study of five two-factor authentication methods . In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019). Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2019)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00067"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_2_49_1","first-page":"475","article-title":"Systems and methods for push notification based application authentication and authorization","volume":"13","author":"Sanin Aleksey","year":"2014","unstructured":"Aleksey Sanin , Matt Ricketson , Ryan Newlman , Andrew LeBlanc , and Eric Stern . 2014 . Systems and methods for push notification based application authentication and authorization . US Patent App. 13\/915 , 475 . Aleksey Sanin, Matt Ricketson, Ryan Newlman, Andrew LeBlanc, and Eric Stern. 2014. Systems and methods for push notification based application authentication and authorization. US Patent App. 13\/915,475.","journal-title":"US Patent App."},{"volume-title":"Attacking mTAN-applications like e-banking and mobile signatures","author":"Schartner Peter","key":"e_1_3_2_2_50_1","unstructured":"Peter Schartner and Stefan B\u00fcrger . 2011. Attacking mTAN-applications like e-banking and mobile signatures . University of Klagenfurt (2011) . Peter Schartner and Stefan B\u00fcrger. 2011. Attacking mTAN-applications like e-banking and mobile signatures. University of Klagenfurt (2011)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144468"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485910"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978328"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212501"},{"volume-title":"10th Symposium On Usable Privacy and Security ($$SOUPS$$","year":"2014","author":"Stobert Elizabeth","key":"e_1_3_2_2_55_1","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The password life cycle: user behaviour in managing passwords . In 10th Symposium On Usable Privacy and Security ($$SOUPS$$ 2014). 243--255. Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In 10th Symposium On Usable Privacy and Security ($$SOUPS$$ 2014). 243--255."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169958"},{"key":"e_1_3_2_2_58_1","unstructured":"Symentec. 2021. Almost 100 Organizations in Brazil Targeted with Banking Trojan. https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/banking-trojan-latam-brazil. Symentec. 2021. Almost 100 Organizations in Brazil Targeted with Banking Trojan. https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/banking-trojan-latam-brazil."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859779"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323404"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"volume-title":"Proceedings of the 4th international symposium on Information and communication technologies. 249--254","year":"2005","author":"der Merwe Alta Van","key":"e_1_3_2_2_62_1","unstructured":"Alta Van der Merwe , Marianne Loock , and Marek Dabrowski . 2005 . Characteristics and responsibilities involved in a phishing attack . In Proceedings of the 4th international symposium on Information and communication technologies. 249--254 . Alta Van der Merwe, Marianne Loock, and Marek Dabrowski. 2005. Characteristics and responsibilities involved in a phishing attack. In Proceedings of the 4th international symposium on Information and communication technologies. 249--254."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITISEE.2017.8285554"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433202"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"},{"key":"e_1_3_2_2_67_1","volume-title":"USENIX Security Symposium","volume":"5","author":"Winkler Ira S","year":"1995","unstructured":"Ira S Winkler and Brian Dealy . 1995 . Information Security Technology? Don't Rely on It. A Case Study in Social Engineering .. In USENIX Security Symposium , Vol. 5 . 1--1. Ira S Winkler and Brian Dealy. 1995. Information Security Technology? Don't Rely on It. A Case Study in Social Engineering.. In USENIX Security Symposium, Vol. 5. 1--1."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844548"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842192"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518226"}],"event":{"name":"WiSec '23: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Guildford United Kingdom","acronym":"WiSec '23"},"container-title":["Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3590183","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558482.3590183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T13:22:36Z","timestamp":1689254556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558482.3590183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":70,"alternative-id":["10.1145\/3558482.3590183","10.1145\/3558482"],"URL":"https:\/\/doi.org\/10.1145\/3558482.3590183","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]},"assertion":[{"value":"2023-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}