{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:17:49Z","timestamp":1730305069086,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wf-iot.2019.8767327","type":"proceedings-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T20:04:42Z","timestamp":1563825882000},"page":"64-69","source":"Crossref","is-referenced-by-count":12,"title":["Context-Aware Authentication: State-of-the-Art Evaluation and Adaption to the IIoT"],"prefix":"10.1109","author":[{"given":"Moritz","family":"Loske","sequence":"first","affiliation":[{"name":"Fraunhofer IIS, Nuremberg, Germany"}]},{"given":"Lukas","family":"Rothe","sequence":"additional","affiliation":[{"name":"Fraunhofer IIS, Nuremberg, Germany"}]},{"given":"Dominik G.","family":"Gertler","sequence":"additional","affiliation":[{"name":"Ostbayerische Technische Hochschule Amberg-Weiden, Weiden i.d.OPf., Germany"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032987"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6590928"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-014-0334-4"},{"key":"ref36","article-title":"Gait Authentication and Identification Using Wearable Accelerometer Sensor: 7 - 8 June 2007, Alghero, Italy","author":"gafurov","year":"2009","journal-title":"2007 IEEE Workshop on in Automatic Identification Advanced Technologies 2007"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_18"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748278"},{"article-title":"A Survey on Context-based Co-presence Detection Techniques","year":"2018","author":"conti","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314397"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"ref16","first-page":"379","article-title":"Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data","volume":"7459","author":"halevi","year":"2012","journal-title":"European symposium on research in computer security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286269"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.01.003"},{"journal-title":"BenchmarkInsights IBV","article-title":"Internet of threats: Securing the Internet of Things for industrial and utility companies - BenchmarkIn-sights@IBV","year":"2018","key":"ref4"},{"key":"ref27","first-page":"1","article-title":"STASH: Securing transparent authentication schemes using prover-side proximity verification: 12-14 June 2017, San Diego, CA, USA","author":"mika","year":"2017","journal-title":"2017 14th Annual IEEE International Conference on Sensing Communication and Networking (SECON)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2585081"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref29","article-title":"Scalable Group Audio-Based Authentication Scheme for IoT Devices: CIS 2016 : 16-19 December 2016, Wuxi, Jiangsu Province, China : proceedings","author":"gu","year":"2016","journal-title":"International Conference on Computational Intelligence and Security"},{"journal-title":"Context-Aware Authentication for the Internet of Things The Eleventh International Conference on Autonomic and Autonomous Systems","year":"2015","author":"habib","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196106"},{"article-title":"Electronic Authentication Guideline","year":"0","author":"burr","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2290537"},{"key":"ref22","first-page":"349","article-title":"Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing","volume":"8437","author":"shrestha","year":"2014","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.10.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.10.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.29"},{"key":"ref25","first-page":"483","article-title":"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound","author":"karapanos","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"}],"event":{"name":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19)","start":{"date-parts":[[2019,4,15]]},"location":"Limerick, Ireland","end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE 5th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764305\/8767167\/08767327.pdf?arnumber=8767327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:48:24Z","timestamp":1658080104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8767327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2019.8767327","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}