{"id":"https://openalex.org/W2538462682","doi":"https://doi.org/10.1145/2976749.2989045","title":"POSTER","display_name":"POSTER","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2538462682","doi":"https://doi.org/10.1145/2976749.2989045","mag":"2538462682"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2989045","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033826310","display_name":"Peter Mayer","orcid":"https://orcid.org/0000-0002-6267-4874"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Peter Mayer","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065858637","display_name":"Stephan Neumann","orcid":"https://orcid.org/0000-0002-8993-3637"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stephan Neumann","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022078187","display_name":"Melanie Volkamer","orcid":"https://orcid.org/0000-0003-2674-4043"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Melanie Volkamer","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033826310"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14603746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1817","last_page":"1819"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12553","display_name":"Psychedelics and Drug Studies","score":0.9625999927520752,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9186000227928162,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7729398012161255},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7265734076499939},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6263118982315063},{"id":"https://openalex.org/keywords/decision-support-system","display_name":"Decision support system","score":0.5414199829101562},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5086497068405151},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.47183138132095337},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.4682914614677429},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4410296678543091},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.33742737770080566},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3102019727230072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2860336899757385},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12733349204063416},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12596115469932556},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06773656606674194}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7729398012161255},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7265734076499939},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6263118982315063},{"id":"https://openalex.org/C107327155","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision support system","level":2,"score":0.5414199829101562},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5086497068405151},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.47183138132095337},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.4682914614677429},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4410296678543091},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.33742737770080566},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3102019727230072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2860336899757385},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12733349204063416},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12596115469932556},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06773656606674194},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2989045","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W87964389","https://openalex.org/W158950929","https://openalex.org/W2014833947","https://openalex.org/W2030112111","https://openalex.org/W2573418278"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2656445685","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W1989237518","https://openalex.org/W2002093701","https://openalex.org/W4399463150"],"abstract_inverted_index":{"In":[0,39,56,76],"spite":[1],"of":[2,15,23,47,65,106],"the":[3,4,12,21,32,44,62,93,96,104,108,111],"issues":[5],"associated":[6],"with":[7],"them,":[8],"text":[9],"passwords":[10],"are":[11],"predominant":[13],"means":[14],"user":[16],"authentication":[17,25,73],"today.":[18],"To":[19],"foster":[20],"adoption":[22],"alternative":[24],"schemes,":[26],"Renaud":[27],"et":[28],"al.":[29],"(2014)":[30],"proposed":[31],"ACCESS":[33],"(Authentication":[34],"ChoiCE":[35],"Support":[36],"System)":[37],"framework.":[38],"prior":[40],"work,":[41,58],"we":[42,59],"presented":[43],"first":[45],"implementation":[46,69],"this":[48,57,83],"abstract":[49],"framework":[50],"as":[51],"a":[52,71,79],"decision":[53,80,112],"support":[54,81,113],"system.":[55],"report":[60],"on":[61],"current":[63],"progress":[64],"expanding":[66],"our":[67],"prototype":[68],"into":[70],"collaborative":[72,100],"research":[74],"platform.":[75],"addition":[77],"to":[78,89,102],"system,":[82],"platform":[84],"also":[85],"includes":[86],"an":[87],"interface":[88],"systematically":[90],"access":[91],"all":[92],"information":[94],"in":[95],"knowledge":[97],"base":[98],"and":[99],"features":[101],"facilitate":[103],"process":[105],"keeping":[107],"data":[109],"for":[110],"system":[114],"current.":[115]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
