{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:34:31Z","timestamp":1761766471306,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/percomw.2018.8480152","type":"proceedings-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T19:49:51Z","timestamp":1539028191000},"page":"330-335","source":"Crossref","is-referenced-by-count":11,"title":["Wi-Access: Second Factor User Authentication leveraging WiFi Signals"],"prefix":"10.1109","author":[{"given":"Syed W.","family":"Shah","sequence":"first","affiliation":[]},{"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"90","article-title":"Keystroke Recognition Using WiFi Signals","author":"ali","year":"0","journal-title":"Proceedings of the 21st Annual International Conference on Mobile Computing and Networking 2015 (MobiCom &#x2019;15)"},{"key":"ref11","first-page":"159","article-title":"Predictable 802.11 packet delivery from wireless channel measurements","author":"halperin","year":"0","journal-title":"Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM &#x2019;10)"},{"key":"ref12","first-page":"1068","article-title":"When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals","author":"li","year":"0","journal-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016 (CCS &#x2019;16)"},{"journal-title":"Sparse Autoencoder","year":"2011","key":"ref13"},{"journal-title":"Two-Factor Authentication using Biometrics","year":"2017","author":"angelo","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1016\/j.neucom.2006.05.013","article-title":"One Class Document Classification via Neural Network","volume":"70","author":"manvetiz","year":"0","journal-title":"Neurocomputing Elsevier"},{"journal-title":"Breaking the iris scanner locking Samsungs Galaxy S8 is laughably easy","year":"2017","author":"goodin","key":"ref16"},{"key":"ref4","first-page":"483","article-title":"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound","author":"karapanos","year":"2015","journal-title":"Proceedings of 24th USENIX Security Symposium (USENIX Security&#x2019;15)"},{"key":"ref3","article-title":"Wi-Auth: WiFi based Second Factor User Authentication","author":"shah","year":"0","journal-title":"Proceedings of 14th EAI International Conference on Mobile and Ubiquitous Systems Computing Networking and Services Melbourne Australia November 2017 (Mobiquitous&#x2019;17)"},{"journal-title":"Yubikey","year":"0","key":"ref6"},{"journal-title":"RSA SecureID","year":"0","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Phoolproof phishing prevention","author":"parno","year":"0","journal-title":"Proceedings of the 10th International Conference on Financial Cryptography and Data Security (FC)"},{"key":"ref7","first-page":"404","article-title":"Strengthening user authentication through opportunistic cryptographic identity assertions","author":"czeskis","year":"0","journal-title":"Proceedings of the 2012 ACM conference on Computer and communications security (CCS&#x2019;12)"},{"journal-title":"New Study The One Big Security Trick People Are not Using","year":"2016","author":"gott","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2348802"},{"key":"ref9","first-page":"1","article-title":"Two-factor authentication resilient to server compromise using mix-bandwidth devices","author":"shirvanian","year":"0","journal-title":"Proceedings of the Symposium on Network and Distributed System Security"}],"event":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2018,3,19]]},"location":"Athens","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8454955\/8480085\/08480152.pdf?arnumber=8480152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T06:35:07Z","timestamp":1540881307000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8480152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/percomw.2018.8480152","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}