{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:32:12Z","timestamp":1730233932383,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/icccn.2007.4317829","type":"proceedings-article","created":{"date-parts":[[2007,10,3]],"date-time":"2007-10-03T16:23:05Z","timestamp":1191428585000},"page":"257-264","source":"Crossref","is-referenced-by-count":2,"title":["Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking"],"prefix":"10.1109","author":[{"given":"Men","family":"Long","sequence":"first","affiliation":[]},{"given":"David","family":"Durham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"43","article-title":"How to build a low-cost, extended-range RFID skimmer","author":"kirschenbaum","year":"0","journal-title":"Proceedings of USENIX Security Symposium 2006"},{"journal-title":"Staccato Proposal Duet Authentication for Wireless USB","year":"2005","author":"zimmermann","key":"11"},{"journal-title":"JumpStart for WLAN security","year":"2005","key":"12"},{"journal-title":"Revision V10r00","article-title":"Simple Pairing Whitepaper","year":"2006","key":"3"},{"year":"0","key":"2"},{"key":"1","article-title":"Manual authentication for wireless devices, 2004","volume":"7","author":"gehrmann","year":"0","journal-title":"RSA CryptoBytes"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"7","article-title":"Network-in-a-box: How to set up a secure wireless network in under a minute","author":"balfanz","year":"2004","journal-title":"Proc 13th USENIX Security Symposium"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769823"},{"key":"5","article-title":"Predictors of home-based wireless security","author":"hottell","year":"2006","journal-title":"Proc 5th Workshop Economics of Information Security"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"8","first-page":"110","article-title":"Seeing-is-believing: Using camera phones for human-verifiable authentication","author":"mccune","year":"0","journal-title":"Proc 2005 IEEE Symp Security and Privacy"}],"event":{"name":"2007 16th International Conference on Computer Communications and Networks","start":{"date-parts":[[2007,8,13]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2007,8,16]]}},"container-title":["2007 16th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4317769\/4317770\/04317829.pdf?arnumber=4317829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T19:42:50Z","timestamp":1489606970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4317829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icccn.2007.4317829","relation":{},"subject":[],"published":{"date-parts":[[2007,8]]}}}