{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T23:42:11Z","timestamp":1774568531591,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocom.2012.6503213","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T19:29:23Z","timestamp":1367004563000},"page":"813-819","source":"Crossref","is-referenced-by-count":35,"title":["Clock skew based remote device fingerprinting demystified"],"prefix":"10.1109","author":[{"given":"Fabian","family":"Lanze","sequence":"first","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg"}]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg"}]},{"given":"Benjamin","family":"Braatz","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg"}]},{"given":"Andreas","family":"Zinnen","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WESCAN.1997.627159"},{"key":"17","year":"1992","journal-title":"RFC 1323 TCP Extensions for High Performance"},{"key":"18","article-title":"Remote authentication dial in user service (radius)","author":"rigney","year":"2000","journal-title":"Internet Engineering Task Force RFC 2865"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"13","article-title":"Network time protocol (version 3): Specification, implementation and analysis","author":"mills","year":"1992","journal-title":"Internet Engineering Task Force RFC 1305"},{"key":"14","author":"mills","year":"2011","journal-title":"Computer Network Time Synchronization"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.145"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1049\/el:19991369"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1592979"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134682"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"key":"10","year":"2007","journal-title":"Specific Requirements Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification"},{"key":"7","article-title":"Enhancing intrusion detection in wireless networks using radio frequency fingerprinting","author":"hall","year":"2004","journal-title":"Proc IASTED CIIT"},{"key":"6","article-title":"A passive approach to wireless device fingerprinting","author":"gao","year":"2010","journal-title":"IEEE Dependable Systems and Networks"},{"key":"5","article-title":"Passive data link layer 802.11 wireless device driver fingerprinting","author":"franklin","year":"2006","journal-title":"Proc 15th USENIX Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"9","year":"1995","journal-title":"IEEE Guide for Measurement of Environmental Sensitivities of Standard Frequency Generators"},{"key":"8","article-title":"Detection of transient in radio frequency fingerprinting using signal phase","author":"hall","year":"2003","journal-title":"Proc WOC 2003"}],"event":{"name":"GLOBECOM 2012 - 2012 IEEE Global Communications Conference","location":"Anaheim, CA, USA","start":{"date-parts":[[2012,12,3]]},"end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490098\/6503052\/06503213.pdf?arnumber=6503213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:07:02Z","timestamp":1756235222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6503213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/glocom.2012.6503213","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}