{"id":"https://openalex.org/W4384026496","doi":"https://doi.org/10.1109/icbc56567.2023.10174997","title":"Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management","display_name":"Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4384026496","doi":"https://doi.org/10.1109/icbc56567.2023.10174997"},"language":"en","primary_location":{"id":"doi:10.1109/icbc56567.2023.10174997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc56567.2023.10174997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029438999","display_name":"Jozef Drga","orcid":"https://orcid.org/0000-0001-7701-5129"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Jozef Drga","raw_affiliation_strings":["Brno University of Technology,Faculty of Information Technology","Faculty of Information Technology, Brno University of Technology"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,Faculty of Information Technology","institution_ids":["https://openalex.org/I60587646"]},{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037488079","display_name":"Ivan Homoliak","orcid":"https://orcid.org/0000-0002-0790-0875"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ivan Homoliak","raw_affiliation_strings":["Brno University of Technology,Faculty of Information Technology","Faculty of Information Technology, Brno University of Technology"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,Faculty of Information Technology","institution_ids":["https://openalex.org/I60587646"]},{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061180586","display_name":"Juraj Van\u010do","orcid":null},"institutions":[{"id":"https://openalex.org/I165737746","display_name":"Tomas Bata University in Zl\u00edn","ror":"https://ror.org/04nayfw11","country_code":"CZ","type":"education","lineage":["https://openalex.org/I165737746"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Juraj Vanco","raw_affiliation_strings":["University of Tomas Bata,Faculty of Applied Informatics","Faculty of Applied Informatics, University of Tomas Bata"],"affiliations":[{"raw_affiliation_string":"University of Tomas Bata,Faculty of Applied Informatics","institution_ids":["https://openalex.org/I165737746"]},{"raw_affiliation_string":"Faculty of Applied Informatics, University of Tomas Bata","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Athanasios Vasilakos","raw_affiliation_strings":["Brno University of Technology,Faculty of Information Technology","Faculty of Information Technology, Brno University of Technology"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,Faculty of Information Technology","institution_ids":["https://openalex.org/I60587646"]},{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070082706","display_name":"Martin Pere\u0161\u00edni","orcid":null},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Martin Pere\u0161\u00edni","raw_affiliation_strings":["Brno University of Technology,Faculty of Information Technology","Faculty of Information Technology, Brno University of Technology"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,Faculty of Information Technology","institution_ids":["https://openalex.org/I60587646"]},{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008969416","display_name":"Petr Han\u00e1\u010dek","orcid":"https://orcid.org/0000-0001-5507-0768"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Petr Hanacek","raw_affiliation_strings":["University of Agder"],"affiliations":[{"raw_affiliation_string":"University of Agder","institution_ids":["https://openalex.org/I200650556"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5029438999"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":0.9163,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78984625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7565034031867981},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7453705072402954},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7177842855453491},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6508945226669312},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6072372198104858},{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.5549712777137756},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4849820137023926},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4703260660171509},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4615492820739746},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.44939735531806946},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4438059329986572},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3600224256515503},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10085359215736389}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7565034031867981},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7453705072402954},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7177842855453491},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6508945226669312},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6072372198104858},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.5549712777137756},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4849820137023926},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4703260660171509},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4615492820739746},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.44939735531806946},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4438059329986572},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3600224256515503},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10085359215736389},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icbc56567.2023.10174997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc56567.2023.10174997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1774682829","https://openalex.org/W2254700249","https://openalex.org/W2751742180","https://openalex.org/W2993753560","https://openalex.org/W2995809686","https://openalex.org/W3097224604","https://openalex.org/W4205546762","https://openalex.org/W4212851301","https://openalex.org/W6638294888"],"related_works":["https://openalex.org/W4200158873","https://openalex.org/W2265342806","https://openalex.org/W4367058015","https://openalex.org/W2913409654","https://openalex.org/W3215714510","https://openalex.org/W225347985","https://openalex.org/W2067779677","https://openalex.org/W4308615486","https://openalex.org/W171669508","https://openalex.org/W1734119465"],"abstract_inverted_index":{"This":[0],"paper":[1],"focuses":[2],"on":[3,32],"the":[4,34,39,63,83,88,92,111,119,128,132,138,146,171,174],"problem":[5],"of":[6,10,65,74,80,134,167,173],"detection":[7],"and":[8,12,48,59,76,91,94,101,152,164,177],"prevention":[9],"stolen":[11,135],"misused":[13],"secrets":[14],"(such":[15],"as":[16,125,127],"private":[17,89],"keys)":[18],"for":[19,28,44,56,87,99,121],"authentication":[20,36,67,129],"toward":[21],"centralized":[22,70],"services.":[23],"We":[24,53,117,159],"propose":[25],"a":[26,69,77,95],"solution":[27,144],"this":[29],"problem,":[30],"based":[31],"SmartOTPs,":[33],"two-factor":[35],"scheme":[37],"against":[38,68],"blockchain,":[40],"which":[41],"is":[42],"intended":[43],"smart":[45],"contract":[46],"wallets":[47],"utilizes":[49],"one-time":[50],"passwords":[51],"(OTPs).":[52],"modify":[54],"SmartOTPs":[55],"our":[57,81,123,143],"purposes":[58],"utilize":[60,160],"them":[61],"in":[62],"setting":[64],"two-and-a-half-factor":[66],"service":[71],"provider.":[72],"Out":[73],"two":[75],"half":[78,96],"factors":[79],"solution,":[82],"first":[84],"factor":[85,97],"stands":[86,98],"key,":[90],"second":[93],"OTPs":[100,107],"their":[102],"precursors":[103,112],"(a.k.a.,":[104],"pre-images),":[105],"where":[106],"are":[108],"obtained":[109],"from":[110,137],"by":[113],"cryptoaraphically":[114],"secure":[115],"hashing.":[116],"describe":[118],"protocol":[120],"bootstrapping":[122],"approach":[124],"well":[126],"procedure.":[130],"In":[131],"case":[133],"creden-tials":[136],"client,":[139],"we":[140],"show":[141],"that":[142],"enables":[145],"user":[147],"to":[148,154,169],"immediately":[149],"detect":[150],"it":[151],"proceed":[153],"re-initialization":[155],"with":[156],"fresh":[157],"credentials.":[158],"blockchain-based":[161],"identity":[162],"management":[163],"decentralized":[165],"identities":[166],"users":[168],"simplify":[170],"overhead":[172],"registration":[175],"process":[176],"reinitialization.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
