{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:48:36Z","timestamp":1755838116314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,14]],"date-time":"2008-09-14T00:00:00Z","timestamp":1221350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,14]]},"DOI":"10.1145\/1409944.1409957","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:32:46Z","timestamp":1221582766000},"page":"92-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["GAnGS"],"prefix":"10.1145","author":[{"given":"Chia-Hsin Owen","family":"Chen","sequence":"first","affiliation":[{"name":"Academia Sinica, Nankang, Taiwan Roc"}]},{"given":"Chung-Wei","family":"Chen","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan Roc"}]},{"given":"Cynthia","family":"Kuo","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Yan-Hao","family":"Lai","sequence":"additional","affiliation":[{"name":"National Chung Hsing University, Taichung, Taiwan Roc"}]},{"given":"Jonathan M.","family":"McCune","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Ahren","family":"Studer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Bo-Yin","family":"Yang","sequence":"additional","affiliation":[{"name":"Academia Sinica, Nankang, Taiwan Roc"}]},{"given":"Tzong-Chen","family":"Wu","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology, Taipei, Taiwan Roc"}]}],"member":"320","published-online":{"date-parts":[[2008,9,14]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/11745853_28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/S0140-3664(00)00249-8"},{"volume-title":"Symposium on Network and Distributed Systems Security (NDSS).","author":"Balfanz D.","unstructured":"Balfanz , D. , Smetters , D. , Stewart , P. , and Wong , H . Talking to strangers: Authentication in adhoc wireless networks, 2002 . In Symposium on Network and Distributed Systems Security (NDSS). Balfanz, D., Smetters, D., Stewart, P., and Wong, H. Talking to strangers: Authentication in adhoc wireless networks, 2002. In Symposium on Network and Distributed Systems Security (NDSS).","key":"e_1_3_2_1_3_1"},{"unstructured":"Brennen V. A. The keysigning party howto. http:\/\/cryptnet.net\/fdp\/crypto\/keysigning_party\/en\/keysigning_party.html 2008.  Brennen V. A. The keysigning party howto. http:\/\/cryptnet.net\/fdp\/crypto\/keysigning_party\/en\/keysigning_party.html 2008.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"119","volume-title":"Security Protocols?International Workshop (Apr.","author":"Burmester M.","year":"1997","unstructured":"Burmester , M. , and Desmedt , Y . Efficient and secure conference key distribution . In Security Protocols?International Workshop (Apr. 1997 ), vol. 1189 , pp. 119 -- 129 . Burmester, M., and Desmedt, Y. Efficient and secure conference key distribution. In Security Protocols?International Workshop (Apr. 1997), vol. 1189, pp. 119--129."},{"key":"e_1_3_2_1_6_1","volume-title":"-P. Key agreement in peer-to-peer wireless networks","author":"Cagalj M.","year":"2006","unstructured":"Cagalj , M. , Capkun , S. , and Hubaux , J . -P. Key agreement in peer-to-peer wireless networks . IEEE (Special Issue on Cryptography) 94 ( 2006 ), 467--478. Cagalj, M., Capkun, S., and Hubaux, J.-P. Key agreement in peer-to-peer wireless networks. IEEE (Special Issue on Cryptography) 94 (2006), 467--478."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1067170.1067177"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/646334.687813"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/950191.950195"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICDCS.2006.52"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.5555\/647987.741340"},{"key":"e_1_3_2_1_12_1","first-page":"43","article-title":"How to run a meeting","volume":"54","author":"Jay A","year":"1976","unstructured":"Jay , A . How to run a meeting . Harvard Business Review 54 ( 1976 ), 43 -- 57 . Jay, A. How to run a meeting. Harvard Business Review 54 (1976), 43--57.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/BFb0034833","volume-title":"Advances in Cryptology -- (ASIACRYPT)","author":"Just M.","year":"1996","unstructured":"Just , M. , and Vaudenay , S . Authenticated multi-party key agreement . In Advances in Cryptology -- (ASIACRYPT) ( 1996 ), vol. 1163 , pp. 36 -- 49 . Just, M., and Vaudenay, S. Authenticated multi-party key agreement. In Advances in Cryptology -- (ASIACRYPT) (1996), vol. 1163, pp. 36--49."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/352600.352638"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1352533.1352553"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/11935070_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-540-24646-6_3"},{"unstructured":"Linksky J. et al. Simple Pairing Whitepaper revision v10r00. http:\/\/www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F\/0\/SimplePairing_WP_V10r00.pdf August 2006.  Linksky J. et al. Simple Pairing Whitepaper revision v10r00. http:\/\/www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F\/0\/SimplePairing_WP_V10r00.pdf August 2006.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"February","author":"Lortz V.","year":"2006","unstructured":"Lortz , V. , Roberts , D. , Erdmann , B. , Dawidowsky , F. , Hayes , K. , Yee , J. C. , and Ishidoshiro , T . Wi-Fi Simple Config Specification, version 1.0a. Now known as Wi-Fi Protected Setup , February 2006 . Lortz, V., Roberts, D., Erdmann, B., Dawidowsky, F., Hayes, K., Yee, J. C., and Ishidoshiro, T. Wi-Fi Simple Config Specification, version 1.0a. Now known as Wi-Fi Protected Setup, February 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/SP.2005.19"},{"unstructured":"NFC Forum. NFC Forum: Specifications. http:\/\/www.nfc-forum.org\/specs\/.  NFC Forum. NFC Forum: Specifications. http:\/\/www.nfc-forum.org\/specs\/.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","first-page":"131","volume-title":"Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) (July","author":"Perrig A.","year":"1999","unstructured":"Perrig , A. , and Song , D . Hash visualization: A new technique to improve real-world security . In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) (July 1999 ), pp. 131 -- 138 . Perrig, A., and Song, D. Hash visualization: A new technique to improve real-world security. In Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) (July 1999), pp. 131--138."},{"key":"e_1_3_2_1_24_1","first-page":"172","volume-title":"Security Protocols Workshop","author":"Stajano F.","year":"1999","unstructured":"Stajano , F. , and Anderson , R. J . The resurrecting duckling: Security issues for ad-hoc wireless networks . In Security Protocols Workshop ( 1999 ), pp. 172 -- 194 . Stajano, F., and Anderson, R. J. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop (1999), pp. 172--194."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.5555\/646753.704911"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/71.877936"},{"key":"e_1_3_2_1_27_1","first-page":"614","volume-title":"Round-efficient conference-key agreement protocols with provable security. In Advances in Cryptology -- (ASIACRYPT)","volume":"1976","author":"Tzeng W.","year":"2000","unstructured":"Tzeng , W. , and Tzeng , Z . Round-efficient conference-key agreement protocols with provable security. In Advances in Cryptology -- (ASIACRYPT) ( 2000 ), vol. 1976 , pp. 614 -- 628 . Tzeng, W., and Tzeng, Z. Round-efficient conference-key agreement protocols with provable security. In Advances in Cryptology -- (ASIACRYPT) (2000), vol. 1976, pp. 614--628."},{"key":"e_1_3_2_1_28_1","volume-title":"Usable Security (USEC) (Feb.","author":"Uzun E.","year":"2007","unstructured":"Uzun , E. , Karvonen , K. , and Asokan , N . Usability analysis of secure pairing methods . In Usable Security (USEC) (Feb. 2007 ). Uzun, E., Karvonen, K., and Asokan, N. Usability analysis of secure pairing methods. In Usable Security (USEC) (Feb. 2007)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/11964254_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1007\/11535218_19"}],"event":{"sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"acronym":"MobiCom08","name":"MobiCom08: Annual International Conference on Mobile Computing and Networking","location":"San Francisco California USA"},"container-title":["Proceedings of the 14th ACM international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409944.1409957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409944.1409957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:10Z","timestamp":1750258030000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409944.1409957"}},"subtitle":["gather, authenticate 'n group securely"],"short-title":[],"issued":{"date-parts":[[2008,9,14]]},"references-count":29,"alternative-id":["10.1145\/1409944.1409957","10.1145\/1409944"],"URL":"https:\/\/doi.org\/10.1145\/1409944.1409957","relation":{},"subject":[],"published":{"date-parts":[[2008,9,14]]},"assertion":[{"value":"2008-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}