{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:07:51Z","timestamp":1759133271225},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748526"},{"type":"electronic","value":"9783540748533"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74853-3_15","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T17:10:31Z","timestamp":1189703431000},"page":"253-270","source":"Crossref","is-referenced-by-count":82,"title":["Amigo: Proximity-Based Authentication of Mobile Devices"],"prefix":"10.1007","author":[{"given":"Alex","family":"Varshavsky","sequence":"first","affiliation":[]},{"given":"Adin","family":"Scannell","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"LaMarca","sequence":"additional","affiliation":[]},{"given":"Eyal","family":"de Lara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Near field communication (nfc), http:\/\/www.nfc-forum.org\/resources\/faqs"},{"key":"15_CR2","unstructured":"Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. Network and Distributed Systems Security Symposium (2002)"},{"key":"15_CR3","volume-title":"IEEE Workshop on Mobile Computing Systems and Applications","author":"J.J. Barton","year":"2006","unstructured":"Barton, J.J., Zhai, S., Cousins, S.: Mobile phones will become the primary personal computing devices. In: IEEE Workshop on Mobile Computing Systems and Applications, April 2006, IEEE, Los Alamitos (2006)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: Proc. of MobiSys, pp. 51\u201364 (2005)","DOI":"10.1145\/1067170.1067177"},{"key":"15_CR5","unstructured":"Cheung, H.: How to: Building a bluesniper rifle - part 1 (March 2005), http:\/\/www.tomsnetworking.com\/2005\/03\/08\/how_to_bluesniper_pt1"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory, 644\u2013654 (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"15_CR7","unstructured":"Freund, Y., Schapire, R.: Experiments with a new boosting algorithm. In: Proc. of International Conference on Machine Learning, pp. 148\u2013156 (1996)"},{"key":"15_CR8","volume-title":"Proc. of IEEE Internation Conference on Distributed Computing Systems","author":"M. Goodrich","year":"2006","unstructured":"Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: Proc. of IEEE Internation Conference on Distributed Computing Systems, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_10","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"L.E. Holmquist","year":"2001","unstructured":"Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol.\u00a02201, Springer, Heidelberg (2001)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"T. Kindberg","year":"2003","unstructured":"Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, Springer, Heidelberg (2003)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_4","volume-title":"Information Security","author":"T. Kindberg","year":"2003","unstructured":"Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, Springer, Heidelberg (2003)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on accelerometer data. In: Fifth International Conference on in Pervasive Computing (2007)","DOI":"10.1007\/978-3-540-72037-9_9"},{"key":"15_CR13","first-page":"110","volume-title":"Proc. of IEEE Symposium on Security and Privacy","author":"J. McCune","year":"2005","unstructured":"McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. of IEEE Symposium on Security and Privacy, pp. 110\u2013124. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_13","volume-title":"Pervasive Computing","author":"A.J. Nicholson","year":"2006","unstructured":"Nicholson, A.J., Smith, I.E., Hughes, J., Noble, B.D.: Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, Springer, Heidelberg (2006)"},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commun. ACM\u00a027(4), 393\u2013394 (1984)","journal-title":"Commun. ACM"},{"key":"15_CR16","volume-title":"Proc. of IEEE Symposium on Security and Privacy","author":"N. Saxena","year":"2006","unstructured":"Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on visual channel. In: Proc. of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Shaked, Y., Wool, A.: Cracking the bluetooth pin. In: Proc. of Mobisys (2005)","DOI":"10.1145\/1067170.1067176"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_28","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"D. Smetters","year":"2006","unstructured":"Smetters, D., Balfanz, D., Durfee, G., Smith, T., Lee, K.: Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol.\u00a04206, Springer, Heidelberg (2006)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a01796, Springer, Heidelberg (2000)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Stone, W.C.: NIST Construction Automation Program Report No. 3: Electromagnetic Signal Attenuation in Construction Materials (NISTIR 6055), National Technical Information Service, Washington (October 1997)","DOI":"10.6028\/NIST.IR.6055"},{"key":"15_CR21","unstructured":"SWAP-CA. Shared Wireless Access Protocol (Cordless Access) Specification (SWAP-CA), Revision 1.0, The HomeRF Technical Committee (17 December 1998)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Uzun, E., Karvonen, K., Asokan, N.: Usability study of secure pairing methods. Technical Report 2007-02, Nokia Research Center (January 2007)","DOI":"10.1007\/978-3-540-77366-5_29"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Varshavsky, A., LaMarca, A., de Lara, E.: Enabling secure and spontaneous communication between mobile devices using common radio environment. In: IEEE Workshop on Mobile Computing Systems and Applications (HotMobile) (February 2007)","DOI":"10.1109\/HotMobile.2007.12"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Webb, G.: Multiboosting: A technique for combining boosting and wagging. Machine Learning, 159\u2013196 (2000)","DOI":"10.1023\/A:1007659514849"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2007: Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74853-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T01:48:55Z","timestamp":1556848135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74853-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748526","9783540748533"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74853-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}