{"id":"https://openalex.org/W2216847743","doi":"https://doi.org/10.1007/978-3-319-19890-3_29","title":"Two Factor Authentication Made Easy","display_name":"Two Factor Authentication Made Easy","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2216847743","doi":"https://doi.org/10.1007/978-3-319-19890-3_29","mag":"2216847743"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-19890-3_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-19890-3_29","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077097753","display_name":"Alex Q. Chen","orcid":"https://orcid.org/0000-0001-5529-6214"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Alex Q. Chen","raw_affiliation_strings":["School of Computer Engineering, Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070536903","display_name":"Weihan Goh","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Weihan Goh","raw_affiliation_strings":["Singapore Institute of Technology, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology, Singapore, Singapore","institution_ids":["https://openalex.org/I168639165"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077097753"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.0293,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.92096809,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"449","last_page":"458"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11977","display_name":"Technology Use by Older Adults","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3317","display_name":"Demography"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11977","display_name":"Technology Use by Older Adults","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3317","display_name":"Demography"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.872599184513092},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7537962198257446},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.6910263299942017},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6888123750686646},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5684115886688232},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5422488451004028},{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.5317562818527222},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.529721200466156},{"id":"https://openalex.org/keywords/smartwatch","display_name":"Smartwatch","score":0.43515199422836304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42923474311828613},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.42180415987968445},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3556922972202301},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.15392524003982544},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.14679843187332153}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.872599184513092},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7537962198257446},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.6910263299942017},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6888123750686646},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5684115886688232},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5422488451004028},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.5317562818527222},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.529721200466156},{"id":"https://openalex.org/C29794715","wikidata":"https://www.wikidata.org/wiki/Q5362345","display_name":"Smartwatch","level":3,"score":0.43515199422836304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42923474311828613},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.42180415987968445},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3556922972202301},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.15392524003982544},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.14679843187332153},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-19890-3_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-19890-3_29","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/b22719dd-b514-4eba-a813-7f7fbfc60388","is_oa":false,"landing_page_url":"https://research.manchester.ac.uk/en/publications/b22719dd-b514-4eba-a813-7f7fbfc60388","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chen, A Q & Goh, W 2015, Two Factor Authentication Made Easy. in Lecture Notes in Computer Science, Engineering the Web in the Big Data Era. vol. 9114, Lecture Notes in Computer Science, Engineering the Web in the Big Data Era, Springer Nature, 15th International Conference on Web Engineering ICWE 2015, Rotterdam, The Netherlands, 1/01/24.","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:pure.atira.dk:publications/b22719dd-b514-4eba-a813-7f7fbfc60388","is_oa":false,"landing_page_url":"https://www.research.manchester.ac.uk/portal/en/publications/two-factor-authentication-made-easy(b22719dd-b514-4eba-a813-7f7fbfc60388).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W108153470","https://openalex.org/W191859796","https://openalex.org/W1552489662","https://openalex.org/W1593877366","https://openalex.org/W1766693108","https://openalex.org/W1957814438","https://openalex.org/W1987275830","https://openalex.org/W1990178240","https://openalex.org/W2033264974","https://openalex.org/W2037590766","https://openalex.org/W2070473671","https://openalex.org/W2142765329","https://openalex.org/W2143407415","https://openalex.org/W2163113603","https://openalex.org/W2170239431","https://openalex.org/W2171305047","https://openalex.org/W2241836009","https://openalex.org/W2254700249","https://openalex.org/W4212851301"],"related_works":["https://openalex.org/W4235505747","https://openalex.org/W2509150193","https://openalex.org/W2128428210","https://openalex.org/W2399063318","https://openalex.org/W4285587629","https://openalex.org/W2756171776","https://openalex.org/W2765158217","https://openalex.org/W2971637278","https://openalex.org/W2993132146","https://openalex.org/W2599755607"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
