{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:55:12Z","timestamp":1729652112356,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/vitae.2014.6934398","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:54:04Z","timestamp":1414803244000},"page":"1-5","source":"Crossref","is-referenced-by-count":10,"title":["Smartphone assisted security pairings for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Jani","family":"Suomalainen","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"17","first-page":"253","article-title":"Proximity-based authentication of mobile devices. In: Anonymous UbiComp","author":"varshavsky","year":"2007","journal-title":"Ubiquitous Computing"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1368847"},{"key":"16","article-title":"Key establishment in constrained devices","author":"ekberg","year":"2006","journal-title":"Research Seminar on Network Security"},{"key":"13","article-title":"Talking to Strangers: Authentication in Ad-Hoc Wireless Networks","author":"balfanz","year":"2002","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"14","article-title":"Security associations for wireless device","author":"asokan","year":"2009","journal-title":"Mobile and Wireless Network Security and Privacy"},{"key":"11","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/10720107_25","article-title":"The resurrecting duckling","author":"stajano","year":"2000","journal-title":"7th International Workshop on Security Protocols"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023428"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912753"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"key":"7","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/11935070_6","article-title":"Efficient mutual data authentication using manually authenticated strings","author":"laur","year":"2006","journal-title":"Cryptology and Network Security"},{"journal-title":"Pgpfone Pretty good privacy phone owner's manual version 1 0 beta 5 appendix c","year":"1996","author":"zimmermann","key":"6"},{"key":"5","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"gehrmann","year":"2004","journal-title":"RSA CryptoBytes"},{"key":"4","article-title":"Higher layer key exchange techniques for bluetooth security","author":"larsson","year":"2001","journal-title":"Open Group Conference Amsterdam"},{"key":"9","article-title":"SAS-based authenticated key agreement","author":"pasini","year":"2006","journal-title":"Anonymous Public Key Cryptography-PKC"},{"key":"8","article-title":"Secure communications over insecure channels based on short authenticated strings","author":"vaudenay","year":"2005","journal-title":"Advances in Cryptology-CRYPTO"}],"event":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","start":{"date-parts":[[2014,5,11]]},"location":"Aalborg, Denmark","end":{"date-parts":[[2014,5,14]]}},"container-title":["2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6917160\/6934393\/06934398.pdf?arnumber=6934398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T18:37:47Z","timestamp":1565980667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6934398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/vitae.2014.6934398","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}