{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:50:23Z","timestamp":1730328623206,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3661638.3661723","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T22:28:59Z","timestamp":1717280939000},"page":"448-451","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on FIDO Authentication Based on IPv6"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0007-7394-3367","authenticated-orcid":false,"given":"Wenxuan","family":"Xu","sequence":"first","affiliation":[{"name":"School of Information Technology, Guangdong University of Finance and Economics, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0001-5946-2168","authenticated-orcid":false,"given":"Zejun","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Information Technology, Guangdong University of Finance and Economics, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-4669-7926","authenticated-orcid":false,"given":"Qijun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Guangdong University of Finance and Economics, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6653-713X","authenticated-orcid":false,"given":"Weifa","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Information Technology, Guangdong University of Finance and Economics, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"issue":"04","key":"e_1_3_2_1_1_1","first-page":"11","article-title":"password two-factor authentication and its application[J].","volume":"2010","author":"Lanyan LI","unstructured":"LI Lanyan,MAO Xueshi.Dynamic password two-factor authentication and its application[J].Computer Times, 2010 (04):11-13.","journal-title":"Computer Times"},{"issue":"04","key":"e_1_3_2_1_2_1","first-page":"2","article-title":"on fingerprint authentication scheme based on FIDO protocol[J]","volume":"36","author":"Research","year":"2016","unstructured":"Research on fingerprint authentication scheme based on FIDO protocol[J]. Guangdong Communication Technology, 2016, 36(04):2-5.","journal-title":"Guangdong Communication Technology"},{"key":"e_1_3_2_1_3_1","volume-title":"Research on the security of FIDO UAF authentication protocol[D]","author":"Kexin HU","year":"2016","unstructured":"HU Kexin. Research on the security of FIDO UAF authentication protocol[D]. University of Science and Technology of China, 2016."},{"key":"e_1_3_2_1_4_1","volume-title":"China UnionPay's Integrated Trusted Service Management Platform (TSM Platform) for Cardholders Based on Open Cooperation Model. Shanghai","author":"Hongfeng Chai","year":"2014","unstructured":"Chai Hongfeng, China UnionPay's Integrated Trusted Service Management Platform (TSM Platform) for Cardholders Based on Open Cooperation Model. Shanghai, China UnionPay Co., Ltd., 2014, 10-30."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4545"},{"key":"e_1_3_2_1_6_1","volume-title":"Networks Communications","author":"Strong Authentication Dropbox Adds","year":"2015","unstructured":"Computers, Software; Dropbox Adds Support for Fido U2F Strong Authentication, Yubikeys[J]. Computers, Networks Communications, 2015,"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.15587\/1729-4061.2023.285275"},{"issue":"02","key":"e_1_3_2_1_8_1","first-page":"101","article-title":"Quick identity authentication system CFCA FIDO + [J]","volume":"10","author":"Feng Gao","year":"2019","unstructured":"Gao Feng, Zhang Yi, Zhao Yexin. Quick identity authentication system CFCA FIDO + [J]. Cyberspace Security, 2019, 10 (02): 101-107.","journal-title":"Cyberspace Security"},{"issue":"04","key":"e_1_3_2_1_9_1","first-page":"358","article-title":"Internet of Things Identity authentication solution based on FIDO technology [J]","volume":"7","author":"Jun Li","year":"2021","unstructured":"Li Jun, Chai Haixin. Internet of Things Identity authentication solution based on FIDO technology [J]. Information Security Research, 2021, 7 (04): 358-366.","journal-title":"Information Security Research"},{"key":"e_1_3_2_1_10_1","volume-title":"etc. Multi-factor identity authentication method in the unified identity authentication system [J]","author":"Dandan Xu","year":"2023","unstructured":"Xu Dandan, Li Pei, Zhang Shiqian, etc. Multi-factor identity authentication method in the unified identity authentication system [J]. Journal of Fuzhou University (Natural Science Edition), 2023, 51 (05): 616-620."}],"event":{"name":"AISNS 2023: 2023 International Conference on Artificial Intelligence, Systems and Network Security","acronym":"AISNS 2023","location":"Mianyang China"},"container-title":["Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3661638.3661723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T05:36:44Z","timestamp":1717997804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3661638.3661723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":10,"alternative-id":["10.1145\/3661638.3661723","10.1145\/3661638"],"URL":"https:\/\/doi.org\/10.1145\/3661638.3661723","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}