{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T22:35:20Z","timestamp":1723070120485},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/sahcn.2017.7964922","type":"proceedings-article","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T20:45:56Z","timestamp":1499114756000},"source":"Crossref","is-referenced-by-count":5,"title":["STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification"],"prefix":"10.1109","author":[{"given":"Mika","family":"Juuti","sequence":"first","affiliation":[]},{"given":"Christian","family":"Vaas","sequence":"additional","affiliation":[]},{"given":"Ivo","family":"Sluganovic","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Liljestrand","sequence":"additional","affiliation":[]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2016.7473528"},{"key":"ref30","article-title":"Routedetector: Sensor-based positioning system that exploits spatio-temporal regularity of human mobility","author":"watanabe","year":"2015","journal-title":"WOOT"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632077"},{"key":"ref11","author":"halevi","year":"2012","journal-title":"Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517367"},{"key":"ref14","author":"hern","year":"2016","journal-title":"Google aims to kill passwords by the end of this year - Technology - The Guardian"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WISP.2009.5286542"},{"key":"ref16","article-title":"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound","author":"karapanos","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref17","author":"murphy","year":"2012","journal-title":"Machine Learning A Probabilistic Perspective"},{"key":"ref18","author":"narain","year":"2016","journal-title":"Inferring user routes and locations using zero-permission mobile sensors"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668348"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"ref4","author":"brands","year":"1993","journal-title":"Advances in Cryptology-EUROCRYPT'93"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.10.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref29","article-title":"Device analyzer: Understanding smartphone usage","author":"wagner","year":"2013","journal-title":"Intern Conf on Mobile and Ubiq Systems Computing Networking and Services"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/570646.570647"},{"key":"ref8","article-title":"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars","author":"francillon","year":"2011","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790492"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref9","article-title":"Practical relay attack on contactless transactions by using NFC mobile phones","author":"francis","year":"2012","journal-title":"ser Cryptology and Information Security Series"},{"key":"ref1","year":"2016","journal-title":"Android Keeping the device awake"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2555335"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146507"},{"key":"ref24","year":"0","journal-title":"SourceForge BlueProximity"},{"key":"ref23","article-title":"Contextual Proximity Detection in the Face of Context-Manipulating Adversaries","author":"shrestha","year":"2015","journal-title":"arXiv report \/1511 00905"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/34.935847"}],"event":{"name":"2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","location":"San Diego, CA, USA","start":{"date-parts":[[2017,6,12]]},"end":{"date-parts":[[2017,6,14]]}},"container-title":["2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7963990\/7964891\/07964922.pdf?arnumber=7964922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:49:28Z","timestamp":1507002568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7964922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2017.7964922","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}