{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:09:37Z","timestamp":1752984577180,"version":"3.30.2"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/infocom.2017.8057177","type":"proceedings-article","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T20:28:21Z","timestamp":1507235301000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic field"],"prefix":"10.1109","author":[{"given":"Fudong","family":"Qiu","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer Science and Engineering, Shanghai Jiao Tong University, China"}]},{"given":"Zhengxian","family":"He","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer Science and Engineering, Shanghai Jiao Tong University, China"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer Science and Engineering, Shanghai Jiao Tong University, China"}]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer Science and Engineering, Shanghai Jiao Tong University, China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Amigo: Proximity-based authentication of mobile devices","author":"varshavsky","year":"2007","journal-title":"ACM Ubicomp"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2044904"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1323(02)00043-4"},{"journal-title":"Earth's Magnetic Field","year":"0","key":"ref13"},{"key":"ref14","article-title":"Assessment of indoor magnetic field anomalies using multiple magnetometers","author":"afzal","year":"2010","journal-title":"ION GNSS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000010"},{"journal-title":"Pulse code communication","year":"1953","author":"gray","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.771145"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1860079.1860090"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288120"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2012.6418880"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/295838"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518284"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590321"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.114"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2003","author":"stallings","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/881978.881999"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1942268.1942270"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2310747"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935028"}],"event":{"name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","start":{"date-parts":[[2017,5,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2017,5,4]]}},"container-title":["IEEE INFOCOM 2017 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8049192\/8056940\/08057177.pdf?arnumber=8057177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:34Z","timestamp":1734376534000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8057177\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infocom.2017.8057177","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}