{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:49Z","timestamp":1773511009885,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,29]]},"DOI":"10.1109\/wcnc49053.2021.9417287","type":"proceedings-article","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T01:53:25Z","timestamp":1620266005000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Push yoUr Password: Secure and Fast WiFi Connection for IoT Devices"],"prefix":"10.1109","author":[{"given":"Junyoung","family":"Choi","sequence":"first","affiliation":[]},{"given":"Jaewon","family":"Hur","sequence":"additional","affiliation":[]},{"given":"Saewoong","family":"Bahk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524366"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"ref13","year":"0"},{"key":"ref14","author":"bluetooth","year":"2010","journal-title":"Specification of the Bluetooth System Covered Core Package Version 4 0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397124"},{"key":"ref16","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref4","year":"0","journal-title":"Samsung SmartHome Website"},{"key":"ref3","year":"0","journal-title":"Amazon Tap Website"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"ref5","year":"0","journal-title":"IoT Device Security is Being Seriously Neglected"},{"key":"ref8","article-title":"Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas","author":"cai","year":"2011","journal-title":"Proc NDSS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_15"},{"key":"ref2","article-title":"Insecurity in the Internet of Things","author":"barcena","year":"2015","journal-title":"Security Response"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2017.7964941"},{"key":"ref1","year":"2030","journal-title":"Number of Connected IoT Devices Will Surge to 125 Billion"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990365"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397125"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2437"},{"key":"ref23","article-title":"Clustering with the K-means Algorithm","author":"ng","year":"2012","journal-title":"Machine Learning"},{"key":"ref25","author":"daemen","year":"2013","journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard"}],"event":{"name":"2021 IEEE Wireless Communications and Networking Conference (WCNC)","location":"Nanjing, China","start":{"date-parts":[[2021,3,29]]},"end":{"date-parts":[[2021,4,1]]}},"container-title":["2021 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9417241\/9417112\/09417287.pdf?arnumber=9417287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:40:56Z","timestamp":1652197256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9417287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,29]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wcnc49053.2021.9417287","relation":{},"subject":[],"published":{"date-parts":[[2021,3,29]]}}}