{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:52:49Z","timestamp":1742935969396,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309724"},{"type":"electronic","value":"9783642309731"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30973-1_31","type":"book-chapter","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T15:32:31Z","timestamp":1337787151000},"page":"314-325","source":"Crossref","is-referenced-by-count":7,"title":["PINtext: A Framework for Secure Communication Based on Context"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Sigg","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Schuermann","sequence":"additional","affiliation":[]},{"given":"Yusheng","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Bichler, D., Stromberg, G., Huemer, M.: Innovative key generation approach to encrypt wireless communication in personal area networks. In: Proceedings of the 50th International Global Communications Conference (2007)","key":"31_CR1","DOI":"10.1109\/GLOCOM.2007.41"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-540-74853-3_18","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"D. Bichler","year":"2007","unstructured":"Bichler, D., Stromberg, G., Huemer, M., L\u00f6w, M.: Key Generation Based on Acceleration Data of Shaking Processes. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol.\u00a04717, pp. 304\u2013317. Springer, Heidelberg (2007)"},{"unstructured":"Brown, R.G.: Dieharder: A random number test suite (2011), http:\/\/www.phy.duke.edu\/~rgb\/General\/dieharder.php","key":"31_CR3"},{"issue":"6","key":"31_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"31_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2010.3","volume":"8","author":"J.P. Dunning","year":"2010","unstructured":"Dunning, J.P.: Taming the blue beast: A survey of Bluetooth based threats. IEEE Security Privacy\u00a08(2), 20\u201327 (2010)","journal-title":"IEEE Security Privacy"},{"doi-asserted-by":"crossref","unstructured":"Dupuy, C., Torre, A.: Local Clusters, trust, confidence and proximity, Clusters and Globalisation: The development of urban and regional economies, pp. 175\u2013195 (2006)","key":"31_CR6","DOI":"10.4337\/9781847200136.00016"},{"issue":"1536-1268","key":"31_CR7","first-page":"10","volume":"4","author":"H.W. Gellersen","year":"2004","unstructured":"Gellersen, H.W., Kortuem, G., Schmidt, A., Beigl, M.: Physical prototyping with smart-its. IEEE Pervasive Computing\u00a04(1536-1268), 10\u201318 (2004)","journal-title":"IEEE Pervasive Computing"},{"issue":"2","key":"31_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1076\/jnmr.32.2.211.16746","volume":"32","author":"J. Haitsma","year":"2003","unstructured":"Haitsma, J., Kalker, T.: A Highly Robust Audio Fingerprinting System. Journal of New Music Research\u00a032(2), 211\u2013221 (2003)","journal-title":"Journal of New Music Research"},{"doi-asserted-by":"crossref","unstructured":"Ben Hamida, S.T., Pierrot, J.B., Castelluccia, C.: An adaptive quantization algorithm for secret key generation using radio channel measurements. In: Proceedings of the 3rd International Conference on New Technologies, Mobility and Security (2009)","key":"31_CR9","DOI":"10.1109\/NTMS.2009.5384826"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/26.385951","volume":"43","author":"J. Hershey","year":"1995","unstructured":"Hershey, J., Hassan, A., Yarlagadda, R.: Unconventional cryptographic keying variable management. IEEE Transactions on Communications\u00a043, 3\u20136 (1995)","journal-title":"IEEE Transactions on Communications"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-45427-6_10","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"L.E. Holmquist","year":"2001","unstructured":"Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 116\u2013122. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Jansen, W., Scarfone, K.: Guidelines on cell phone and PDA security. Technical Report SP 800-124, National Institute of Standards and Technology (2008)","key":"31_CR12","DOI":"10.6028\/NIST.SP.800-124"},{"doi-asserted-by":"crossref","unstructured":"Karlson, A.K., Brush, A.J.B., Schechter, S.: Can I borrow your phone?: Understanding concerns when sharing mobile phones. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009 (2010)","key":"31_CR13","DOI":"10.1145\/1518701.1518953"},{"doi-asserted-by":"crossref","unstructured":"Kuiper, N.H.: Tests concerning random points on a circle. In: Proceedings of the Koinklijke Nederlandse Akademie van Wetenschappen, vol.\u00a063, pp. 38\u201347 (1962)","key":"31_CR14","DOI":"10.1016\/S1385-7258(60)50006-0"},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-74853-3_10","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"K. Kunze","year":"2007","unstructured":"Kunze, K., Lukowicz, P.: Symbolic Object Localization Through Active Sampling of Acceleration and Sound Signatures. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol.\u00a04717, pp. 163\u2013180. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Madiseh, M.G., McGuire, M.L., Neville, S.S., Cai, L., Horie, M.: Secret key generation and agreement in UWB communication channels. In: Proceedings of the 51st International Global Communications Conference, Globecom (2008)","key":"31_CR16","DOI":"10.1109\/GLOCOM.2008.ECP.356"},{"doi-asserted-by":"crossref","unstructured":"Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: Nfc devices: Security and privacy. In: Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 642\u2013647 (March 2008)","key":"31_CR17","DOI":"10.1109\/ARES.2008.105"},{"doi-asserted-by":"crossref","unstructured":"Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: Proximate: Proximity-based secure pairing using ambient wireless signals. In: Proceedings of the Ninth International Conference on Mobile Systems, Applications and Services, MobiSys 2011 (2011)","key":"31_CR18","DOI":"10.1145\/1999995.2000016"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-73275-4_1","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"R. Mayrhofer","year":"2007","unstructured":"Mayrhofer, R.: The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 1\u201315. Springer, Heidelberg (2007)"},{"key":"31_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-72037-9_9","volume-title":"Pervasive Computing","author":"R. Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Gellersen, H.-W.: Shake Well Before Use: Authentication Based on Accelerometer Data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 144\u2013161. Springer, Heidelberg (2007)"},{"unstructured":"Mayrhofer, R., Gellersen, H.W.: Shake well before use: Two implementations for implicit context authentication. In: Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp 2007), pp. 72\u201375 (2007)","key":"31_CR21"},{"issue":"3","key":"31_CR22","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.istr.2008.10.005","volume":"13","author":"R. Mayrhofer","year":"2008","unstructured":"Mayrhofer, R., Gellersen, H.W.: Spontaneous mobile device authentication based on sensor data. Information Security Technical Report\u00a013(3), 136\u2013150 (2008)","journal-title":"Information Security Technical Report"},{"unstructured":"Nehmadi, L., Meyer, J.: A system for studying usability of mobile security. In: Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (2011)","key":"31_CR23"},{"key":"31_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-12654-3_8","volume-title":"Pervasive Computing","author":"J. Seifert","year":"2010","unstructured":"Seifert, J., De Luca, A., Conradi, B., Hussmann, H.: TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones. In: Flor\u00e9en, P., Kr\u00fcger, A., Spasojevic, M. (eds.) Pervasive 2010. LNCS, vol.\u00a06030, pp. 130\u2013137. Springer, Heidelberg (2010)"},{"unstructured":"Siewiorek, D., Smailagic, A., Furukawa, J., Krause, A., Moraveji, N., Reiger, K., Shaffer, J., Wong, F.L.: Sensay: A context-aware mobile phone. In: Proceedings of the 7th IEEE International Symposium on Wearable Computers","key":"31_CR25"},{"doi-asserted-by":"crossref","unstructured":"Sigg, S.: Context-based security: State of the art, open research topics and a case study. In: Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems, CASEMANS 2011 (2011)","key":"31_CR26","DOI":"10.1145\/2036146.2036150"},{"key":"31_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-24279-3_31","volume-title":"Modeling and Using Context","author":"S. Sigg","year":"2011","unstructured":"Sigg, S., Budde, M., Ji, Y., Beigl, M.: Entropy of Audio Fingerprints for Unobtrusive Device Authentication. In: Beigl, M., Christiansen, H., Roth-Berghofer, T.R., Kofod-Petersen, A., Coventry, K.R., Schmidtke, H.R. (eds.) CONTEXT 2011. LNCS, vol.\u00a06967, pp. 296\u2013299. Springer, Heidelberg (2011)"},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"1568","DOI":"10.1109\/TAP.2004.830257","volume":"52","author":"G. Smith","year":"2004","unstructured":"Smith, G.: A direct derivation of a single-antenna reciprocity relation for the time domain. IEEE Transactions on Antennas and Propagation\u00a052, 1568\u20131577 (2004)","journal-title":"IEEE Transactions on Antennas and Propagation"},{"doi-asserted-by":"crossref","unstructured":"Tuyls, P., Skoric, B., Kevenaar, T.: Security with Noisy Data. Springer (2007)","key":"31_CR29","DOI":"10.1007\/978-1-84628-984-2"},{"doi-asserted-by":"crossref","unstructured":"Varshavsky, A., Scannell, A., LaMarca, A., de Lara, E.: Amigo: Proximity-based authentication of mobile devices. International Journal of Security and Networks (2009)","key":"31_CR30","DOI":"10.1504\/IJSN.2009.023422"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30973-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T19:12:53Z","timestamp":1713985973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30973-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309724","9783642309731"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30973-1_31","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}