{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:32:34Z","timestamp":1725503554374},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/percom.2013.6526719","type":"proceedings-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T21:05:11Z","timestamp":1371157511000},"page":"94-102","source":"Crossref","is-referenced-by-count":2,"title":["PIKE: Enabling secure interaction with piggybacked key-exchange"],"prefix":"10.1109","author":[{"given":"W.","family":"Apolinarski","sequence":"first","affiliation":[]},{"given":"M.","family":"Handte","sequence":"additional","affiliation":[]},{"given":"M. U.","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"P. J.","family":"Marron","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"OpenID Authentication 2 0 - Final","year":"2007","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199867"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"23","article-title":"Speakersense: Energy efficient unobtrusive speaker identification on mobile phones","author":"lu","year":"0","journal-title":"Proc of the 9th Intl Conf on Pervasive Computing 2011"},{"key":"18","article-title":"Gangs: Gather authenticate n group securely","author":"hsin owen chen","year":"0","journal-title":"Proc of the ACM Annual Int Conf on Mobile Comp and Networking (MobiCom) 2008"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555818"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.105"},{"key":"14","article-title":"Practical nfc peer-to-peer relay attack using mobile phones","author":"francis","year":"2010","journal-title":"RFIDSec'11"},{"key":"11","article-title":"Security associations in personal networks: A comparative analysis","author":"suomalainen","year":"2007","journal-title":"ESA'07"},{"key":"12","article-title":"Security in near field communication (nfc)","author":"haselsteiner","year":"0","journal-title":"Workshop on RFID Security 2006"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"3","article-title":"Secure communication based on ambient audio","author":"schu?rmann","year":"2011","journal-title":"Mobile Computing IEEE Trans on"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5849"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276924"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.33"},{"journal-title":"Specification of the Bluetooth System Core Version 2 1 + Edr","year":"2007","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_10"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-39881-3_15","article-title":"Trust context spaces: An infrastructure for pervasive security in context-aware environments","author":"robinson","year":"2004","journal-title":"Security in Pervasive Computing"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_1"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30973-1_31"}],"event":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications (PerCom 2013)","start":{"date-parts":[[2013,3,18]]},"location":"San Diego, CA","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6520974\/6526701\/06526719.pdf?arnumber=6526719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T14:36:03Z","timestamp":1498055763000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6526719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/percom.2013.6526719","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}