{"id":"https://openalex.org/W4312503084","doi":"https://doi.org/10.1007/978-3-031-21280-2_25","title":"Secure Human Identification Protocol with\u00a0Human-Computable Passwords","display_name":"Secure Human Identification Protocol with\u00a0Human-Computable Passwords","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312503084","doi":"https://doi.org/10.1007/978-3-031-21280-2_25"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-21280-2_25","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-21280-2_25","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-21280-2_25.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-21280-2_25.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070227845","display_name":"S\u0142awomir Matelski","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155185","display_name":"Intel (Poland)","ror":"https://ror.org/05bx22c71","country_code":"PL","type":"company","lineage":["https://openalex.org/I1343180700","https://openalex.org/I4210155185"]},{"id":"https://openalex.org/I188884621","display_name":"Lodz University of Technology","ror":"https://ror.org/00s8fpf52","country_code":"PL","type":"education","lineage":["https://openalex.org/I188884621"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"S\u0142awomir Matelski","raw_affiliation_strings":["Intelco LLC, Lodz, Poland","Lodz University of Technology, Lodz, Poland"],"affiliations":[{"raw_affiliation_string":"Intelco LLC, Lodz, Poland","institution_ids":["https://openalex.org/I4210155185"]},{"raw_affiliation_string":"Lodz University of Technology, Lodz, Poland","institution_ids":["https://openalex.org/I188884621"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5070227845"],"corresponding_institution_ids":["https://openalex.org/I188884621","https://openalex.org/I4210155185"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":1.8208,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86386478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"452","last_page":"467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8600016832351685},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8519713282585144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5963702201843262},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5168328881263733},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47693365812301636},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43468931317329407},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.42325571179389954},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4218199849128723},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1413915753364563}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8600016832351685},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8519713282585144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5963702201843262},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5168328881263733},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47693365812301636},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43468931317329407},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.42325571179389954},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4218199849128723},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1413915753364563},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-21280-2_25","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-21280-2_25","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-21280-2_25.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-21280-2_25","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-21280-2_25","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-21280-2_25.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312503084.pdf","grobid_xml":"https://content.openalex.org/works/W4312503084.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W38127577","https://openalex.org/W190530026","https://openalex.org/W1482972535","https://openalex.org/W1529679142","https://openalex.org/W2000947266","https://openalex.org/W2005011496","https://openalex.org/W2019017059","https://openalex.org/W2039428813","https://openalex.org/W2091860529","https://openalex.org/W2107465855","https://openalex.org/W2157007820","https://openalex.org/W2160584199","https://openalex.org/W2162610170","https://openalex.org/W2284883188","https://openalex.org/W2293813270","https://openalex.org/W2774968930","https://openalex.org/W2782676523","https://openalex.org/W3032863003","https://openalex.org/W3106786794","https://openalex.org/W3197878201"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2353749315","https://openalex.org/W1989935232","https://openalex.org/W137222638","https://openalex.org/W3104966193","https://openalex.org/W1983660090","https://openalex.org/W2123843216","https://openalex.org/W2892748340","https://openalex.org/W3216707083"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"this":[2,60],"paper":[3,120],"we":[4,147],"present":[5],"a":[6,47,92,111,162],"new":[7,144],"method":[8,23,80],"of":[9,27,59,81,126,158,164],"secure":[10],"human-computer":[11],"identification,":[12],"which":[13,146],"remains":[14],"safe":[15],"also":[16,117],"in":[17,113,168],"untrusted":[18],"systems":[19],"and":[20,41,83,194],"environments.":[21],"This":[22],"allows":[24],"the":[25,37,57,77,135,156,172,186,192,202],"elimination":[26],"any":[28],"supplementary":[29],"gadgets/devices":[30],"or":[31,72],"theft-sensitive":[32],"biometric":[33],"data":[34],"used":[35,95],"by":[36,68,73,96,110,142,191],"Multi-Factor":[38],"Authentication":[39,74],"(MFA),":[40],"using":[42],"only":[43,114],"one":[44],"secret":[45,154,198],"as":[46],"universal":[48],"private":[49],"key":[50,93],"for":[51,66,88,129],"all":[52],"obtainable":[53],"online":[54],"accounts.":[55],"However,":[56],"features":[58],"solution":[61],"make":[62],"it":[63],"best":[64],"suited":[65],"use":[67],"an":[69,123,159,182],"mobile":[70],"authenticator":[71],"Authority":[75],"with":[76,122,139,150],"Single-Sign-On":[78],"(SSO)":[79],"identity":[82],"access":[84],"management,":[85],"rather":[86],"than":[87],"individual":[89],"services.":[90],"Such":[91],"is":[94],"our":[97,143],"innovative":[98],"challenge-response":[99],"protocol":[100],"to":[101,134,200],"generate":[102],"One-Time-Password,":[103],"e.g.,":[104],"6-digit":[105],"OTP,":[106],"could":[107],"be":[108],"calculated":[109],"human":[112],"15":[115],"s,":[116],"offline":[118],"on":[119,171,185],"documents":[121],"acceptable":[124],"level":[125],"security":[127],"required":[128],"post-quantum":[130],"symmetric":[131],"cyphers,":[132],"thanks":[133],"hard":[136],"lattice":[137],"problem":[138],"noise":[140],"introduced":[141],"method,":[145],"call":[148],"Learning":[149],"Options":[151],"(LWO).":[152],"The":[153,175],"has":[155],"form":[157],"outline":[160],"like":[161],"kind":[163],"handwritten":[165],"autograph,":[166],"designed":[167],"invisible":[169,183],"ink":[170],"mapping":[173],"grid.":[174],"password":[176],"generation":[177],"process":[178],"requires":[179],"following":[180],"such":[181],"contour":[184],"challenge":[187],"matrix":[188],"created":[189],"randomly":[190],"verifier":[193],"reading":[195],"values":[196],"from":[197],"fields":[199],"calculate":[201],"OTP.":[203]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
