{"id":"https://openalex.org/W4210311363","doi":"https://doi.org/10.1007/s10207-022-00578-7","title":"Scalable, password-based and threshold authentication for smart homes","display_name":"Scalable, password-based and threshold authentication for smart homes","publication_year":2022,"publication_date":"2022-02-07","ids":{"openalex":"https://openalex.org/W4210311363","doi":"https://doi.org/10.1007/s10207-022-00578-7"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-022-00578-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00578-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00578-7.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00578-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008176285","display_name":"Andrea Huszti","orcid":"https://orcid.org/0000-0002-5110-6388"},"institutions":[{"id":"https://openalex.org/I132735039","display_name":"University of Debrecen","ror":"https://ror.org/02xf66n48","country_code":"HU","type":"education","lineage":["https://openalex.org/I132735039"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Andrea Huszti","raw_affiliation_strings":["Faculty of Informatics, University of Debrecen, Debrecen, Hungary"],"affiliations":[{"raw_affiliation_string":"Faculty of Informatics, University of Debrecen, Debrecen, Hungary","institution_ids":["https://openalex.org/I132735039"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048110572","display_name":"Szabolcs Kov\u00e1cs","orcid":"https://orcid.org/0000-0001-8768-5425"},"institutions":[{"id":"https://openalex.org/I132735039","display_name":"University of Debrecen","ror":"https://ror.org/02xf66n48","country_code":"HU","type":"education","lineage":["https://openalex.org/I132735039"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Szabolcs Kov\u00e1cs","raw_affiliation_strings":["CCLab Ltd., Faculty of Informatics, University of Debrecen, Debrecen, Hungary"],"affiliations":[{"raw_affiliation_string":"CCLab Ltd., Faculty of Informatics, University of Debrecen, Debrecen, Hungary","institution_ids":["https://openalex.org/I132735039"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000437626","display_name":"Norbert Ol\u00e1h","orcid":null},"institutions":[{"id":"https://openalex.org/I132735039","display_name":"University of Debrecen","ror":"https://ror.org/02xf66n48","country_code":"HU","type":"education","lineage":["https://openalex.org/I132735039"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Norbert Ol\u00e1h","raw_affiliation_strings":["Faculty of Informatics, University of Debrecen, Debrecen, Hungary"],"affiliations":[{"raw_affiliation_string":"Faculty of Informatics, University of Debrecen, Debrecen, Hungary","institution_ids":["https://openalex.org/I132735039"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008176285"],"corresponding_institution_ids":["https://openalex.org/I132735039"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":2.9967,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91188662,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"707","last_page":"723"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8610405921936035},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8214058876037598},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7069242000579834},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.5760000944137573},{"id":"https://openalex.org/keywords/dictionary-attack","display_name":"Dictionary attack","score":0.5431231260299683},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5425958633422852},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.5098627805709839},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.5083047747612},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4639432430267334},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4395264983177185},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.43883004784584045},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4208371341228485},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.3663039207458496},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16645509004592896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8610405921936035},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8214058876037598},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7069242000579834},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.5760000944137573},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.5431231260299683},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5425958633422852},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.5098627805709839},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.5083047747612},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4639432430267334},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4395264983177185},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.43883004784584045},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4208371341228485},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.3663039207458496},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16645509004592896}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-022-00578-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00578-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00578-7.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:dea.lib.unideb.hu:2437/328419","is_oa":true,"landing_page_url":"http://hdl.handle.net/2437/328419","pdf_url":null,"source":{"id":"https://openalex.org/S4306402089","display_name":"University of Debrecen Electronic Archive (University of Debrecen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I132735039","host_organization_name":"University of Debrecen","host_organization_lineage":["https://openalex.org/I132735039"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"idegen nyelv\u0171 foly\u00f3iratk\u00f6zlem\u00e9ny k\u00fclf\u00f6ldi lapban"}],"best_oa_location":{"id":"doi:10.1007/s10207-022-00578-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00578-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00578-7.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1544852519","display_name":null,"funder_award_id":"2018-1.2.1-NKP","funder_id":"https://openalex.org/F4320335908","funder_display_name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap"}],"funders":[{"id":"https://openalex.org/F4320325658","display_name":"Debreceni Egyetem","ror":"https://ror.org/02xf66n48"},{"id":"https://openalex.org/F4320335908","display_name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4210311363.pdf","grobid_xml":"https://content.openalex.org/works/W4210311363.grobid-xml"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W27238938","https://openalex.org/W203500824","https://openalex.org/W1481063535","https://openalex.org/W1486852732","https://openalex.org/W1487139370","https://openalex.org/W1510965759","https://openalex.org/W1518776743","https://openalex.org/W1573295900","https://openalex.org/W1578151293","https://openalex.org/W1579090196","https://openalex.org/W1586583492","https://openalex.org/W1600255172","https://openalex.org/W1858410342","https://openalex.org/W1895302964","https://openalex.org/W1971427863","https://openalex.org/W1995759750","https://openalex.org/W2013689938","https://openalex.org/W2048887528","https://openalex.org/W2072554986","https://openalex.org/W2073809844","https://openalex.org/W2079262069","https://openalex.org/W2081713029","https://openalex.org/W2091020476","https://openalex.org/W2095807803","https://openalex.org/W2102349355","https://openalex.org/W2111310412","https://openalex.org/W2117064875","https://openalex.org/W2132544882","https://openalex.org/W2149336128","https://openalex.org/W2152924492","https://openalex.org/W2168690110","https://openalex.org/W2177212599","https://openalex.org/W2560195950","https://openalex.org/W2590306272","https://openalex.org/W2619405973","https://openalex.org/W2733765803","https://openalex.org/W2754914709","https://openalex.org/W2768696376","https://openalex.org/W2783584779","https://openalex.org/W2791810490","https://openalex.org/W2903734052","https://openalex.org/W2903781571","https://openalex.org/W2903797322","https://openalex.org/W2951601527","https://openalex.org/W2960944858","https://openalex.org/W2975298911","https://openalex.org/W2995210401","https://openalex.org/W3004162218","https://openalex.org/W3004171232","https://openalex.org/W3005784829","https://openalex.org/W3100362635","https://openalex.org/W3161894933","https://openalex.org/W4250478701"],"related_works":["https://openalex.org/W313857503","https://openalex.org/W4328027822","https://openalex.org/W2787328792","https://openalex.org/W4319978184","https://openalex.org/W2784826804","https://openalex.org/W2804831377","https://openalex.org/W2597260025","https://openalex.org/W4321600778","https://openalex.org/W1483236455","https://openalex.org/W1982820384"],"abstract_inverted_index":{"Abstract":[0],"Smart":[1],"homes":[2],"are":[3,55,77,88,110,229],"a":[4,65,140,143,155,169,177,238,289],"special":[5],"use-case":[6],"of":[7,71,83,130,241,264,279],"the":[8,51,58,69,89,184,203,225,233,242,248,253,269,280,283,298],"IoT":[9,227],"paradigm,":[10],"which":[11,37,182],"is":[12,133,176,202,215,288,308],"becoming":[13],"more":[14,16],"and":[15,24,81,103,120,157,179,221,252,276,282,300,303,310],"important":[17],"in":[18,68,94,205,244],"our":[19,27,34,294,306],"lives.":[20],"Although":[21],"sensors,":[22],"devices":[23,228],"applications":[25],"make":[26],"daily":[28],"lives":[29],"easier,":[30],"they":[31],"often":[32],"collect":[33],"sensitive":[35,85],"data,":[36],"may":[38],"lead":[39],"to":[40,112,134,186,207,217,257,296],"security":[41,53,61,223,239],"problems":[42],"(e.g.,":[43],"hacked":[44],"devices,":[45,199],"botnets,":[46],"etc.).":[47],"In":[48],"several":[49],"cases,":[50],"appropriate":[52,309],"mechanisms":[54],"missing":[56],"within":[57],"devices.":[59],"Therefore,":[60],"measures":[62],"have":[63],"become":[64],"central":[66],"topic":[67],"field":[70],"IoT.":[72],"The":[73,127,173,213],"most":[74,90],"essential":[75],"requirements":[76],"secure":[78],"user\u2013device":[79],"authentication":[80,278],"confidentiality":[82],"transferred":[84],"data.":[86],"Passwords":[87],"widely":[91],"used":[92],"factors":[93],"various":[95],"areas,":[96],"such":[97,115],"as":[98,116],"user":[99,141,281],"authentication,":[100],"key":[101,162,165,274],"establishment,":[102],"also":[104,230,236],"secret":[105],"sharing.":[106],"Password-based":[107],"protocols":[108],"that":[109,268,305],"resistant":[111],"typical":[113],"threats,":[114],"offline":[117,210],"dictionary,":[118],"man-in-the-middle":[119],"phishing":[121],"attacks,":[122],"generate":[123],"new":[124],"session":[125,273],"keys.":[126],"major":[128],"aim":[129],"these":[131],"solutions":[132],"guarantee":[135],"high-level":[136],"security,":[137],"even":[138],"if":[139,224],"applies":[142],"single":[144],"low-entropy":[145],"human":[146],"memorable":[147],"password":[148],"for":[149,168,261,312],"all":[150],"their":[151],"accounts.":[152],"We":[153,235,246,266],"introduce":[154],"threshold":[156],"password-based,":[158],"distributed,":[159],"mutual":[160,277],"authenticated":[161,231],"agreement":[163],"with":[164],"confirmation":[166],"protocol":[167,175,214,243,259,271,295],"smart":[170,197,313],"home":[171,198],"environment.":[172],"proposed":[174,270],"scalable":[178],"robust":[180],"scheme,":[181],"forces":[183],"adversary":[185],"corrupt":[187],"$$l-1$$":[188],"<mml:math":[189],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[190],"<mml:mrow>":[191],"<mml:mi>l</mml:mi>":[192],"<mml:mo>-</mml:mo>":[193],"<mml:mn>1</mml:mn>":[194],"</mml:mrow>":[195],"</mml:math>":[196],"where":[200],"l":[201],"threshold,":[204],"order":[206],"perform":[208,258],"an":[209],"dictionary":[211],"attack.":[212],"designed":[216],"achieve":[218],"password-only":[219],"setting,":[220],"end-to-end":[222],"chosen":[226],"besides":[232],"user.":[234],"provide":[237],"analysis":[240],"AVISPA.":[245],"apply":[247],"on-the-fly":[249],"model":[250],"checker":[251],"constraint-logic-based":[254],"attack":[255],"searcher":[256],"verification":[260],"bounded":[262],"numbers":[263],"sessions.":[265],"show":[267],"provides":[272],"secrecy":[275],"device":[284],"manager.":[285],"Since":[286],"efficiency":[287],"crucial":[290],"aspect,":[291],"we":[292],"implemented":[293],"measure":[297],"computation":[299],"communication":[301],"costs":[302],"demonstrate":[304],"solution":[307],"eligible":[311],"homes.":[314]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
