{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:44:58Z","timestamp":1743093898569,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031603907"},{"type":"electronic","value":"9783031603914"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60391-4_1","type":"book-chapter","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T07:01:47Z","timestamp":1718607707000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SPAWN: Seamless Proximity-Based Authentication by\u00a0Utilizing the\u00a0Existent WiFi Environment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6216-6100","authenticated-orcid":false,"given":"Philipp","family":"Jakubeit","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2929-5001","authenticated-orcid":false,"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5113-2746","authenticated-orcid":false,"given":"Maarten","family":"van Steen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"1_CR1","unstructured":"Crawford, H., Ahmadzadeh, E.: Authentication on the go: assessing the effect of movement on mobile device keystroke dynamics. In: Thirteenth Symposium on Usable Privacy and Security, pp. 163\u2013173 (2017)"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2196-064X-1-7","volume":"1","author":"H Crawford","year":"2014","unstructured":"Crawford, H., Renaud, K.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manage. 1, 1\u201328 (2014)","journal-title":"J. Trust Manage."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Dee, T., Richardson, I., Tyagi, A.: Continuous transparent mobile device touchscreen soft keyboard biometric authentication. In: 32nd International Conference on VLSI Design, pp. 539\u2013540. IEEE (2019)","DOI":"10.1109\/VLSID.2019.00125"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"6318","DOI":"10.1109\/TMC.2023.3321514","volume":"23","author":"N Ghose","year":"2023","unstructured":"Ghose, N., Gupta, K., Lazos, L., Li, M., Xu, Z., Li, J.: ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification. IEEE Trans. Mob. Comput. 23, 6318\u20136333 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MITP.2013.73","volume":"15","author":"P Richard","year":"2013","unstructured":"Richard, P.: Security: active authentication. IT Professional 15(4), 4\u20137 (2013)","journal-title":"IT Professional"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Han, D., Chen, Y., Li, T., Zhang, R., Zhang, Y., Hedgpeth, T.: Proximity-proof: secure and usable mobile two-factor authentication. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 401\u2013415 (2018)","DOI":"10.1145\/3241539.3241574"},{"key":"1_CR7","first-page":"547","volume":"37","author":"P Jaccard","year":"1901","unstructured":"Jaccard, P.: \u00c9tude comparative de la distribution florale dans une portion des alpes et des jura. Bull. Soc. Vaudoise Sci. Nat. 37, 547\u2013579 (1901)","journal-title":"Bull. Soc. Vaudoise Sci. Nat."},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Jakubeit, P., Peter, A., van Steen, M.: The measurable environment as nonintrusive authentication factor on the example of WiFi beacon frames. In: Saracino, A., Mori, P. (eds.)International Workshop on Emerging Technologies for Authorization and Authentication, pp. 48\u201369. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-25467-3_4","DOI":"10.1007\/978-3-031-25467-3_4"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Jakubeit, P., Peter, A., van Steen, M.: LocKey: location-based key extraction from the WiFi environment in the user\u2019s vicinity. In: Proceedings of the Eighteenth International Conference on Information Security Practice and Experience (2023)","DOI":"10.1007\/978-981-99-7032-2_24"},{"key":"1_CR10","first-page":"102996","volume":"65","author":"AA Jolfaei","year":"2022","unstructured":"Jolfaei, A.A., Mala, H., Zarezadeh, M.: EO-PSI-CA: efficient outsourced private set intersection cardinality. J. Inf. Secur. Appl. 65, 102996 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Chang, S., Perlner, R.: Nist special publication 800\u2013185: sha-3 derived functions: cshake, kmac, tuplehash and parallelhash. Tech. Rep., National Institute of Standards and Technology, Gaithersburg, MD (2016)","DOI":"10.6028\/NIST.SP.800-185"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"4337","DOI":"10.1109\/TIT.2009.2025545","volume":"55","author":"R Konig","year":"2009","unstructured":"Konig, R., Renner, R., Schaffner, C.: The operational meaning of min-and max-entropy. IEEE Trans. Inf. Theory 55, 4337\u20134347 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/JIOT.2017.2761700","volume":"4","author":"Z Li","year":"2017","unstructured":"Li, Z., Wang, H., Fang, H.: Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet Things J. 4(6), 1955\u20131963 (2017)","journal-title":"IEEE Internet Things J."},{"key":"1_CR14","unstructured":"LastPass by\u00a0LogMeIn. The 3rd annual global password security report. Tillg\u00e4nglig (2019). https:\/\/lp-cdn.lastpass.com\/lporcamedia\/document-library\/lastpass\/pdf\/en\/LMI0828a-IAM-LastPass-State-of-the-Password-Report. pdf"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Luo, Z., Wang, W., Qu, J., Jiang, T., Zhang, Q.: ShieldScatter: improving IoT security with backscatter assistance. In: Proceedings of the 16th ACM conference on Embedded Networked Sensor Systems, pp. 185\u2013198 (2018)","DOI":"10.1145\/3274783.3274841"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Pierson, T.J., Peters, T., Peterson, R., Kotz, D.: Proximity detection with single-antenna IoT devices. In: The 25th Annual International Conference on Mobile Computing and Networking, pp. 1\u201315 (2019)","DOI":"10.1145\/3300061.3300120"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-78372-7_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"B Pinkas","year":"2018","unstructured":"Pinkas, B., Schneider, T., Weinert, C., Wieder, U.: Efficient circuit-based PSI via cuckoo hashing. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 125\u2013157. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_5"},{"key":"1_CR18","unstructured":"Prove. State of MFA Report (2023). https:\/\/www.prove.com\/blog\/prove-identity-2023-state-of-mfa-report-consumer-attitudes-multi-factor-authentication"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-aware active authentication using smartphone accelerometer measurements. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 98\u2013105 (2014)","DOI":"10.1109\/CVPRW.2014.20"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Rosulek, M., Trieu, N.: Compact and malicious private set intersection for small sets. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1166\u20131181 (2021)","DOI":"10.1145\/3460120.3484778"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Shah, S.W., Kanhere, S.S.: Wi-Auth: Wifi based second factor user authentication. In: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 393\u2013402 (2017)","DOI":"10.1145\/3144457.3144468"},{"key":"1_CR22","unstructured":"NIST special Publication 800-79-2. Guidelines for the authorization of personal identity (2022). https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/back-basics-multi-factor-authentication-mfa"},{"issue":"1","key":"1_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3448084","volume":"5","author":"A Trivedi","year":"2021","unstructured":"Trivedi, A., Zakaria, C., Balan, R., Becker, A., Corey, G., Shenoy, P.: WiFiTrace: network-based contact tracing for infectious diseases using passive WiFi sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1), 1\u201326 (2021)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-21548-4_6","volume-title":"Information Security and Privacy","author":"T van de Kamp","year":"2019","unstructured":"van de Kamp, T., Stritzl, D., Jonker, W., Peter, A.: Two-client and multi-client functional encryption for set intersection. In: Jang-Jaccard, J., Guo, F. (eds.) ACISP 2019. LNCS, vol. 11547, pp. 97\u2013115. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21548-4_6"},{"key":"1_CR25","unstructured":"WiFi Alliance: WiFi Direct (2023). https:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-direct"},{"key":"1_CR26","unstructured":"Wigle: WiFi Network Database (2022). https:\/\/wigle.net\/"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"91027","DOI":"10.1109\/ACCESS.2022.3201645","volume":"10","author":"B Yuen","year":"2022","unstructured":"Yuen, B., et al.: Wi-fi and bluetooth contact tracing without user intervention. IEEE Access 10, 91027\u201391044 (2022)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60391-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T07:02:21Z","timestamp":1718607741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60391-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031603907","9783031603914"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60391-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISTP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Information Security Theory and Practice","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wistp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wistp2024.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}