{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T18:10:16Z","timestamp":1756836616727,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/percomw.2012.6197527","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:30:23Z","timestamp":1337884223000},"page":"431-434","source":"Crossref","is-referenced-by-count":8,"title":["Using ambient audio in secure mobile phone communication"],"prefix":"10.1109","author":[{"given":"Ngu","family":"Nguyen","sequence":"first","affiliation":[{"name":"National Institute of Informatics (NII), Tokyo, Japan"}]},{"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[{"name":"National Institute of Informatics (NII), Tokyo, Japan"}]},{"given":"An","family":"Huynh","sequence":"additional","affiliation":[{"name":"National Institute of Informatics (NII), Tokyo, Japan"}]},{"given":"Yusheng","family":"Ji","sequence":"additional","affiliation":[{"name":"National Institute of Informatics (NII), Tokyo, Japan"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614350"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366659"},{"key":"17","first-page":"288","article-title":"Audio matching via chroma-based statistical features","author":"mueller","year":"0","journal-title":"Proceedings of the 6th International Conference on Music Information Retrieval (ISMIR) 2005"},{"key":"18","article-title":"Content fingerprinting using wavelets","author":"baluja","year":"0","journal-title":"Proceedings of the Conference of Visual Media Production London UK 2006"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1076\/jnmr.32.2.211.16746"},{"key":"16","article-title":"An industrial-strength audio search algorithm","author":"wang","year":"0","journal-title":"Proc 2003 ISMIR International Symposium on Music Information Retrieval 2003"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30973-1_31"},{"key":"14","article-title":"A review of audio fingerprinting","volume":"41","author":"cano","year":"2005","journal-title":"Journal of VLSI Signal Processing Systems"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2036146.2036150"},{"key":"21","article-title":"Survey and evaluation of audio fingerprinting schemes for mobile audio search","author":"chandrasekhar","year":"0","journal-title":"International Symposium on Music and Information Retrieval (ISMIR) Miami Florida October 2011"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_10"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000047"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.005"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.41"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"5","article-title":"Talking to strangers: Authentication in ad-hoc wireless networks","author":"balfanz","year":"0","journal-title":"Proceedings of the Symposium on Network and Distributed System Security 2002"},{"key":"4","article-title":"Amigo: Proximity-based authentication of mobile devices","author":"varshavsky","year":"2009","journal-title":"International Journal of Security and Networks"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_1"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_9"}],"event":{"name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2012,3,19]]},"location":"Lugano, Switzerland","end":{"date-parts":[[2012,3,23]]}},"container-title":["2012 IEEE International Conference on Pervasive Computing and Communications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6192378\/6197445\/06197527.pdf?arnumber=6197527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:30:23Z","timestamp":1756834223000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6197527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/percomw.2012.6197527","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}