{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:57:53Z","timestamp":1767117473525},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540720362"},{"type":"electronic","value":"9783540720379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72037-9_9","type":"book-chapter","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T14:15:26Z","timestamp":1182435326000},"page":"144-161","source":"Crossref","is-referenced-by-count":106,"title":["Shake Well Before Use: Authentication Based on Accelerometer Data"],"prefix":"10.1007","author":[{"given":"Rene","family":"Mayrhofer","sequence":"first","affiliation":[]},{"given":"Hans","family":"Gellersen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-540-27809-2_22","volume-title":"Financial Cryptography","author":"J.H. Hoepman","year":"2004","unstructured":"Hoepman, J.H.: The emphemeral pairing problem. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 212\u2013226. Springer, Heidelberg (2004)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-45427-6_10","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"L.E. Holmquist","year":"2001","unstructured":"Holmquist, L.E., et al.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 116\u2013122. Springer, Heidelberg (2001)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/10720107_24","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., et al. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, pp. 172\u2013194. Springer, Heidelberg (2000)"},{"key":"9_CR4","unstructured":"Kindberg, T., Zhang, K., Im, S.H.: Evidently secure device associations. Technical Report HPL-2005-40, HP Laboratories Bristol (2005)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/10958513_4","volume-title":"Information Security","author":"T. Kindberg","year":"2003","unstructured":"Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 44\u201353. Springer, Heidelberg (2003)"},{"key":"9_CR6","first-page":"110","volume-title":"Proc. IEEE Symp. on Security and Privacy","author":"J.M. McCune","year":"2005","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. IEEE Symp. on Security and Privacy, pp. 110\u2013124. IEEE CS Press, Los Alamitos (2005)"},{"key":"9_CR7","first-page":"10","volume-title":"Proc. ICDCS 2006: 26th Conf. on Distributed Computing","author":"M.T. Goodrich","year":"2006","unstructured":"Goodrich, M.T., et al.: Loud and clear: Human verifiable authentication based on audio. In: Proc. ICDCS 2006: 26th Conf. on Distributed Computing, p. 10. IEEE CS Press, Los Alamitos (2006)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/11748625_13","volume-title":"Pervasive Computing","author":"A.J. Nicholson","year":"2006","unstructured":"Nicholson, A.J., et al.: LoKey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Fishkin, K.P., et al. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, pp. 202\u2013219. Springer, Heidelberg (2006)"},{"key":"9_CR9","first-page":"467","volume":"94","author":"M. \u010cagalj","year":"2006","unstructured":"\u010cagalj, M., \u010capkun, S., Hubaux, J.P.: Key agreement in peer-to-peer wireless networks. IEEE (Special Issue on Cryptography and Security)\u00a094, 467\u2013478 (2006)","journal-title":"IEEE (Special Issue on Cryptography and Security)"},{"key":"9_CR10","first-page":"29","volume":"7","author":"C. Gehrmann","year":"2004","unstructured":"Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes\u00a07, 29\u201337 (2004)","journal-title":"RSA Cryptobytes"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1067170.1067177","volume-title":"Proc. MobiSys 2005: 3rd Int. Conf. on Mobile Systems, Applications, and Services","author":"C. Castelluccia","year":"2005","unstructured":"Castelluccia, C., Mutaf, P.: Shake them up? In: Proc. MobiSys 2005: 3rd Int. Conf. on Mobile Systems, Applications, and Services, pp. 51\u201364. ACM Press, New York (2005)"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964696.964713","volume-title":"Proc. UIST \u201903: 16th ACM Symp. on User Interface Software and Technology","author":"K. Hinckley","year":"2003","unstructured":"Hinckley, K.: Synchronous gestures for multiple persons and computers. In: Proc. UIST \u201903: 16th ACM Symp. on User Interface Software and Technology, pp. 149\u2013158. ACM Press, New York (2003)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","first-page":"33","volume-title":"Pervasive Computing","author":"G. Borriello","year":"2004","unstructured":"Borriello, G., Hannaford, B., Lester, J.: \u201cAre you with me?\u201d \u2013 Using accelerometers to determine if two devices are carried by the same person. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001, pp. 33\u201350. Springer, Heidelberg (2004)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Batina, L., Mentens, N., Verbauwhede, I.: Side-channel issues for designing secure hardware implementations. In: Proc. IOLTS: IEEE Online Testing Symp. (2005)","DOI":"10.1109\/IOLTS.2005.64"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-24646-6_11","volume-title":"Pervasive Computing","author":"P. Lukowicz","year":"2004","unstructured":"Lukowicz, P., Junker, H., Tr\u00f6ster, G.: Automatic Calibration of Body Worn Acceleration Sensors. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001, pp. 176\u2013181. Springer, Heidelberg (2004)"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/BSN.2006.1","volume-title":"Proc. BSN 2006: Int. Workshop on Wearable and Implantable Body Sensor Networks","author":"R. Aylward","year":"2006","unstructured":"Aylward, R., Lovell, S.D., Paradiso, J.A.: A compact, wireless, wearable sensor network for interactive dance ensembles. In: Proc. BSN 2006: Int. Workshop on Wearable and Implantable Body Sensor Networks, pp. 65\u201368. IEEE CS Press, Los Alamitos (2006)"},{"key":"9_CR17","series-title":"ACM Int. Conf. Proceeding Series","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/1107548.1107591","volume-title":"Proc. Soc-EUSAI 2005","author":"T. Huynh","year":"2005","unstructured":"Huynh, T., Schiele, B.: Analyzing features for activity recognition. In: Proc. Soc-EUSAI 2005. ACM Int. Conf. Proceeding Series, pp. 159\u2013163. ACM Press, New York (2005)"},{"key":"9_CR18","volume-title":"Practical Cryptography","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, Chichester (2003)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. on Information Theory"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commununications of ACM\u00a027, 393\u2013394 (1984)","journal-title":"Commununications of ACM"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b105124","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S. Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, Springer, Heidelberg (2005)"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72037-9_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:03:53Z","timestamp":1619517833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72037-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720362","9783540720379"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72037-9_9","relation":{},"subject":[]}}