{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:44:26Z","timestamp":1763037866655,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031254666"},{"type":"electronic","value":"9783031254673"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25467-3_4","type":"book-chapter","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:05:12Z","timestamp":1675058712000},"page":"48-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Measurable Environment as\u00a0Nonintrusive Authentication Factor on\u00a0the\u00a0Example of\u00a0WiFi Beacon Frames"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Jakubeit","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[]},{"given":"Maarten","family":"van Steen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"5008","DOI":"10.1109\/JIOT.2020.2975779","volume":"7","author":"M Abuhamad","year":"2020","unstructured":"Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: AUToSen: deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008\u20135020 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","volume":"163","author":"FH Al-Naji","year":"2020","unstructured":"Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in internet of things environment. Comput. Commun. 163, 109\u2013133 (2020)","journal-title":"Comput. Commun."},{"key":"4_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101683","volume":"89","author":"MA Alawami","year":"2020","unstructured":"Alawami, M.A., Kim, H.: LocAuth: a fine-grained indoor location-based authentication system using wireless networks characteristics. Comput. Secur. 89, 101683 (2020)","journal-title":"Comput. Secur."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bao, L.: Location authentication methods for wireless network access control. In: 2008 IEEE International Performance, Computing and Communications Conference, pp. 160\u2013167 (2008)","DOI":"10.1109\/PCCC.2008.4745118"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Cho, Y., Bao, L., Goodrich, M.T.: LAAC: a location-aware access control protocol. In: 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops, pp. 1\u20137 (2006)","DOI":"10.1109\/MOBIQW.2006.361757"},{"key":"4_CR6","unstructured":"Dierks, T.: TLS v 1.2 (2008). http:\/\/www.hjp.at\/doc\/rfc\/rfc5246.html"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"4_CR8","unstructured":"GNOME. org.freedesktop.networkmanager.accesspoint (2021). https:\/\/developer.gnome.org\/NetworkManager\/1.2\/gdbus-org.freedesktop.NetworkManager.AccessPoint.html"},{"key":"4_CR9","unstructured":"IEEE Standard. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (2007). https:\/\/www.iith.ac.in\/tbr\/teaching\/docs\/802.11-2007.pdf"},{"key":"4_CR10","unstructured":"Intel. Dual band wireless-ac 8265 (2021). https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/products\/94150\/intel-dual-band-wireless-ac-8265.html"},{"key":"4_CR11","unstructured":"ISO 27000. Information technology, security techniques, information security management systems, overview andvocabulary (2018)"},{"key":"4_CR12","first-page":"547","volume":"37","author":"P Jaccard","year":"1901","unstructured":"Jaccard, P.: \u00c9tude comparative de la distribution florale dans une portion des alpes et des jura. Bull. Soc. Vaudoise Sci. Nat. 37, 547\u2013579 (1901)","journal-title":"Bull. Soc. Vaudoise Sci. Nat."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Jeong, W., et al.: SDR receiver using commodity WiFi via physical-layer signal reconstruction. In: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, pp. 1\u201314 (2020)","DOI":"10.1145\/3372224.3419189"},{"key":"4_CR14","unstructured":"Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data Driven Authentication: On the effectiveness of user behaviour modelling with mobile device sensors (2014)"},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1086\/681788","volume":"41","author":"N Lebovic","year":"2015","unstructured":"Lebovic, N.: Biometrics, or the power of the radical center. Crit. Inq. 41(4), 841\u2013868 (2015)","journal-title":"Crit. Inq."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"McKenna, S.J., Gong, S.: Non-intrusive person authentication for access control by visual tracking and face recognition. In: International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 177\u2013183 (1997)","DOI":"10.1007\/BFb0015994"},{"issue":"5","key":"4_CR17","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TC.2016.2622262","volume":"66","author":"A Mosenia","year":"2017","unstructured":"Mosenia, A., Sur-Kolay, S., Raghunathan, A., Jha, N.K.: CABA: continuous authentication based on BioAura. IEEE Trans. Comput. 66(5), 759\u2013772 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Neal, T.J., Woodard, D.L., Striegel, A.D.: Mobile device application, bluetooth, and Wi-Fi usage data as behavioral biometric traits. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20136 (2015)","DOI":"10.1109\/BTAS.2015.7358777"},{"key":"4_CR19","unstructured":"NIST. Digital identity guidelines, authentication and lifecycle management (2021). https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Pang, X., Yang, L., Liu, M., Ma, J.: Mineauth: mining behavioural habits for continuous authentication on a smartphone. In: Australasian Conference on Information Security and Privacy, pp. 533\u2013551 (2019)","DOI":"10.1007\/978-3-030-21548-4_29"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"08","DOI":"10.1109\/TMC.2015.2483498","volume":"15","author":"A Pham","year":"2016","unstructured":"Pham, A., Huguenin, K., Bilogrevic, I., Dacosta, I., Hubaux, J.-P.: SecureRun: cheat-proof and private summaries for location-based activities. IEEE Trans. Mob. Comput. 15, 08 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Rudd, E.M., Boult, T.E.: Caliper: continuous authentication layered with integrated PKI encoding recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 127\u2013135 (2016)","DOI":"10.1109\/CVPRW.2016.31"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, pp. 1\u20136 (2009)","DOI":"10.1145\/1514411.1514414"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"CE Shannon","year":"1951","unstructured":"Shannon, C.E.: Prediction and entropy of printed English. Bell Syst. Tech. J. 30, 50\u201364 (1951)","journal-title":"Bell Syst. Tech. J."},{"key":"4_CR25","first-page":"2837","volume":"11","author":"NX Vinh","year":"2010","unstructured":"Vinh, N.X., Epps, J., Bailey, J.: Information theoretic measures for clusterings comparison: variants, properties, normalization and correction for chance. J. Mach. Learn. Res. 11, 2837\u20132854 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR26","unstructured":"Wen, M., Hanwen, L.: Radar detection for 802.11 a systems in 5 GHz band. In: Proceedings of 2005 International Conference on Wireless Communications, Networking and Mobile Computing, vol. 1, pp. 512\u2013514. IEEE (2005)"},{"key":"4_CR27","unstructured":"WP29. Opinion 01\/2017 on the proposed regulation for the eprivacy regulation (2002\/58\/EC) (2017)"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25467-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:06:35Z","timestamp":1675058795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25467-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031254666","9783031254673"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25467-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hosting.services.iit.cnr.it\/etaa2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}