{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:17:07Z","timestamp":1742397427814},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748526"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74853-3_12","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T17:10:31Z","timestamp":1189703431000},"page":"199-216","source":"Crossref","is-referenced-by-count":9,"title":["Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction"],"prefix":"10.1007","author":[{"given":"Rene","family":"Mayrhofer","sequence":"first","affiliation":[]},{"given":"Hans","family":"Gellersen","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Hazas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"12_CR1","first-page":"29","volume":"7","author":"C. Gehrmann","year":"2004","unstructured":"Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes\u00a07(1), 29\u201337 (2004)","journal-title":"RSA Cryptobytes"},{"key":"12_CR2","first-page":"172","volume-title":"Proc. 7th Int. Workshop on Security Protocols","author":"F. Stajano","year":"1999","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. 7th Int. Workshop on Security Protocols, pp. 172\u2013194. Springer, Heidelberg (1999)"},{"unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. NDSS 2002, The Internet Society (2002)","key":"12_CR3"},{"key":"12_CR4","first-page":"14","volume-title":"Proc. WMCSA 2002","author":"T. Kindberg","year":"2002","unstructured":"Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proc. WMCSA 2002, pp. 14\u201321. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","first-page":"126","volume-title":"UbiComp 2003","author":"T. Kindberg","year":"2003","unstructured":"Kindberg, T., Zhang, K.: Secure spontaneous devices association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, p. 126. Springer, Heidelberg (2003)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/10958513_4","volume-title":"Information Security","author":"T. Kindberg","year":"2003","unstructured":"Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 44\u201353. Springer, Heidelberg (2003)"},{"key":"12_CR7","first-page":"110","volume-title":"Proc. IEEE Symp. on Security and Privacy","author":"J.M. McCune","year":"2005","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. IEEE Symp. on Security and Privacy, pp. 110\u2013124. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"12_CR8","first-page":"10","volume-title":"Proc. ICDCS 2006","author":"M.T. Goodrich","year":"2006","unstructured":"Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human verifiable authentication based on audio. In: Proc. ICDCS 2006, p. 10. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/11964254_9","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"J. Clulow","year":"2006","unstructured":"Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Butty\u00e1n, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol.\u00a04357, pp. 83\u201397. Springer, Heidelberg (2006)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/1067170.1067190","volume-title":"Proc. MobiSys 2005","author":"M. Hazas","year":"2005","unstructured":"Hazas, M., Kray, C., Gellersen, H., Agbota, H., Kortuem, G., Krohn, A.: A relative positioning system for co-located mobile devices. In: Proc. MobiSys 2005, pp. 177\u2013190. ACM Press, New York (2005)"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1095034.1095049","volume-title":"Proc. UIST 2005","author":"G. Kortuem","year":"2005","unstructured":"Kortuem, G., Kray, C., Gellersen, H.: Sensing and visualizing spatial relations of mobile devices. In: Proc. UIST 2005, pp. 93\u2013102. ACM Press, New York (2005)"},{"unstructured":"Guinard, D., Streng, S., Gellersen, H.: Relategateways: A user interface for spontaneous mobile interaction with pervasive services. In: CHI 2007 Workshop on Mobile Spatial Interaction (2007)","key":"12_CR12"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1067170.1067176","volume-title":"Proc. MobiSys 2005","author":"Y. Shaked","year":"2005","unstructured":"Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proc. MobiSys 2005, pp. 39\u201350. ACM Press, New York (2005)"},{"issue":"6","key":"12_CR14","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. on Information Theory"},{"issue":"4","key":"12_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commununications of ACM\u00a027(4), 393\u2013394 (1984)","journal-title":"Commununications of ACM"},{"key":"12_CR16","volume-title":"Practical Cryptography","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Chichester (2003)"},{"doi-asserted-by":"crossref","unstructured":"Eronen, P., Tschofenig, H.: RFC4279: Pre-shared key ciphersuites for transport layer security (TLS) (December 2005)","key":"12_CR17","DOI":"10.17487\/rfc4279"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2007: Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74853-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:42:52Z","timestamp":1619520172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74853-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748526"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74853-3_12","relation":{},"subject":[]}}