{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:15Z","timestamp":1730211675102,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679353","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"360-366","source":"Crossref","is-referenced-by-count":0,"title":["Building a Secure Cross-Device Communication Channel for Smart Devices Based on App Accounts"],"prefix":"10.1109","author":[{"given":"Lanlan","family":"Pan","sequence":"first","affiliation":[{"name":"University of Science and Technology of China,Anhui,China"}]},{"given":"Ruonan","family":"Qiu","sequence":"additional","affiliation":[{"name":"Guangdong OPPO Mobile Telecommunications Corp. Ltd,Guangdong,China"}]},{"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangdong OPPO Mobile Telecommunications Corp. Ltd,Guangdong,China"}]},{"given":"Minghui","family":"Yang","sequence":"additional","affiliation":[{"name":"Guangdong OPPO Mobile Telecommunications Corp. Ltd,Guangdong,China"}]}],"member":"263","reference":[{"volume-title":"Continuity","year":"2023","key":"ref1"},{"volume-title":"Nearby","year":"2023","key":"ref2"},{"volume-title":"Apple platform security","year":"2022","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002897"},{"key":"ref5","first-page":"1556","article-title":"Protecting accounts from credential stuffing with password breach alerting","volume-title":"28th USENIX Security Symposium","author":"Thomas","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516746"},{"journal-title":"Bip 0032","year":"2014","author":"Wuille","key":"ref7"},{"journal-title":"The noise protocol framework","year":"2018","author":"Perrin","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0057"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0003"},{"key":"ref11","first-page":"3917","article-title":"Disrupting continuity of apples wireless ecosystem security: New tracking, {DoS}, and {MitM} attacks on {iOS} and {macOS} through bluetooth low energy,{AWDL}, and {Wi-Fi}","volume-title":"30th USENIX Security Symposium","author":"Stute","year":"2021"},{"key":"ref12","first-page":"37","article-title":"A billion open interfaces for eve and mallory: {MitM},{DoS}, and tracking attacks on {iOS} and {macOS} through apple wireless direct link","volume-title":"28th USENIX Security Symposium","author":"Stute","year":"2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23367"},{"journal-title":"Recommendations for discrete logarithm-based cryptography","year":"2023","author":"SP","key":"ref14"},{"issue":"4","key":"ref15","article-title":"Secure hash standard (shs)","volume":"180","author":"Pub","year":"2012","journal-title":"Fips pub"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5869"},{"volume-title":"Web authentication: An api for accessing public key credentials level 3","year":"2023","key":"ref17"},{"volume-title":"Passkeys","year":"2023","key":"ref18"},{"volume-title":"Bringing passkeys to android & chrome","year":"2023","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_15"},{"volume-title":"Android key and id attestation","year":"2023","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8773"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00034"},{"volume-title":"Noise patterns","year":"2019","author":"Explorer","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"journal-title":"Sp 800\u201338a 2001 edition. recommendation for block cipher modes of operation: Methods and techniques","year":"2001","author":"Dworkin","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5116"},{"volume-title":"app_comm_channel","year":"2023","author":"Pan","key":"ref29"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679353.pdf?arnumber=10679353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:21:43Z","timestamp":1727241703000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679353","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}