{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:42:42Z","timestamp":1730223762384,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/globecom48099.2022.10001118","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:24:18Z","timestamp":1673475858000},"page":"5510-5515","source":"Crossref","is-referenced-by-count":0,"title":["Key Generation with Ambient Audio"],"prefix":"10.1109","author":[{"given":"Bo-Rong","family":"Chen","sequence":"first","affiliation":[{"name":"UIUC"}]},{"given":"Hsin-Tien","family":"Chiang","sequence":"additional","affiliation":[{"name":"Academia Sinica"}]},{"given":"Heng-Cheng","family":"Kuo","sequence":"additional","affiliation":[{"name":"Academia Sinica"}]},{"given":"Yu","family":"Tsao","sequence":"additional","affiliation":[{"name":"Academia Sinica"}]},{"given":"Yih-Chun","family":"Hu","sequence":"additional","affiliation":[{"name":"UIUC"}]}],"member":"263","reference":[{"volume-title":"Altbeacon protocol specification v1.0","year":"2021","key":"ref1"},{"volume-title":"Cdc contact tracing - appendices","year":"2021","key":"ref2"},{"volume-title":"Google\/apple privacy-preserving contact tracing","year":"2021","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"ref5","article-title":"Bluetrace: A privacy-preserving protocol for community-driven contact tracing across borders","author":"Bay","year":"2020","journal-title":"Government Technology Agency-Singapore"},{"key":"ref6","article-title":"Estimating or propagating gradients through stochastic neurons for conditional computation","author":"Bengio","year":"2013","journal-title":"arXiv"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/3384419.3430599"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1038\/s41597-019-0070-1"},{"key":"ref9","article-title":"Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing","author":"C","year":"2020","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1038\/nature06958"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-33167-1_22"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/iccc49849.2020.9238931"},{"key":"ref13","article-title":"Development of taiwan mandarin hearing in noise test","author":"Huang","year":"2005","journal-title":"Department of speech language pathology and audiology, National Taipei University of Nursing and Health science"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1814433.1814466"},{"key":"ref15","first-page":"483","article-title":"Sound-proof: Usable two-factor authentication based on ambient sound","author":"Karapanos","year":"2015","journal-title":"USENIX Security"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s11859-017-1255-0"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1038\/srep02923"},{"volume-title":"Online textbook","author":"Pass","article-title":"A course in cryptography","key":"ref18"},{"issue":"2","key":"ref19","first-page":"2","article-title":"The tesla broadcast authentication protocol","volume":"5","author":"Perrig","year":"2002","journal-title":"Rsa Cryptobytes"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/IJCNN48605.2020.9207581"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TMC.2011.271"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/s41207-021-00243-w"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2976749.2978328"},{"key":"ref24","article-title":"Decentralized privacy-preserving proximity tracing","author":"Troncoso","year":"2020","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-540-74853-3_15"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TASL.2013.2250961"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/3381004"}],"event":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","start":{"date-parts":[[2022,12,4]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2022,12,8]]}},"container-title":["GLOBECOM 2022 - 2022 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000063\/10000593\/10001118.pdf?arnumber=10001118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T03:10:26Z","timestamp":1707448226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10001118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/globecom48099.2022.10001118","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}