{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:40:42Z","timestamp":1773196842286,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006734","name":"Princeton University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006734","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019167","name":"Zurich Information Security and Privacy Center","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019167","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,2,16]]},"DOI":"10.1109\/icnc68183.2026.11416914","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:55:54Z","timestamp":1773086154000},"page":"602-608","source":"Crossref","is-referenced-by-count":0,"title":["GECKO: Securing Digital Assets Through(out) the Physical World"],"prefix":"10.1109","author":[{"given":"Cyrill","family":"Kr\u00e4henb\u00fchl","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Nico","family":"Hauser","sequence":"additional","affiliation":[{"name":"ETH,Z&#x00FC;rich"}]},{"given":"Christelle","family":"Gloor","sequence":"additional","affiliation":[{"name":"ETH,Z&#x00FC;rich"}]},{"given":"Juan Angel","family":"Garc\u00eda-Pardo","sequence":"additional","affiliation":[{"name":"ETH,Z&#x00FC;rich"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"ETH,Z&#x00FC;rich"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Bamboozling certificate authorities with BGP","volume-title":"Proceedings of the USENIX Security Symposium","author":"Birge-Lee"},{"key":"ref2","article-title":"Timeline of certificate authority failures","year":"2022","journal-title":"sslmate"},{"key":"ref3","article-title":"Black Tulip: Report of the investigation into the DigiNotar certificate authority breach","author":"Hoogstraaten","year":"2012"},{"key":"ref4","article-title":"The OAuth 2.0 Authorization Framework","author":"Hardt","year":"2012","journal-title":"IETF"},{"key":"ref5","article-title":"Fast IDentity Online (FIDO) standard","author":"Alliance"},{"key":"ref6","article-title":"GECKO: Securing digital assets through(out) the physical world (extended technical report)","author":"Kr\u00e4henb\u00fchl"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544302"},{"key":"ref8","article-title":"How a covert CIA operation led to vaccine hesitancy in pakistan","author":"Uildriks","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1136\/postgradmedj-2021-141003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.57"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70782"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.007"},{"key":"ref15","article-title":"Department of defense world geodetic system 1984: Its definition and relationships with local geodetic systems","volume-title":"National Geospatial-Intelligence Agency (NGA)","author":"Geomatics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24241"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346853"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133972"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3423165"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40012-4_9"}],"event":{"name":"2026 International Conference on Computing, Networking and Communications (ICNC)","location":"Maui, HI, USA","start":{"date-parts":[[2026,2,16]]},"end":{"date-parts":[[2026,2,19]]}},"container-title":["2026 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11416824\/11416825\/11416914.pdf?arnumber=11416914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:52:03Z","timestamp":1773121923000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11416914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnc68183.2026.11416914","relation":{},"subject":[],"published":{"date-parts":[[2026,2,16]]}}}