{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:43Z","timestamp":1750307263083,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,21]],"date-time":"2010-12-21T00:00:00Z","timestamp":1292889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1145\/1943628.1943649","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A framework for secure device pairing by demonstration of physical proximity"],"prefix":"10.1145","author":[{"given":"Yasir Arfat","family":"Malkani","sequence":"first","affiliation":[{"name":"University of Sussex, Brighton, UK"}]},{"given":"Dan","family":"Chalmers","sequence":"additional","affiliation":[{"name":"University of Sussex, Brighton, UK"}]},{"given":"Ian","family":"Wakeman","sequence":"additional","affiliation":[{"name":"University of Sussex, Brighton, UK"}]}],"member":"320","published-online":{"date-parts":[[2010,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, A.-S","author":"Malkani Y. A.","year":"2010","unstructured":"Malkani , Y. A. , D. Chalmers , and I. Wakeman , Secure Device Association: Trends and Issues , in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, A.-S .K. Pathan, Editor. October 2010 , Auerbach Publication : CRC Press , Taylor &amp; Francis Group, USA. Malkani, Y. A., D. Chalmers, and I. Wakeman, Secure Device Association: Trends and Issues, in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, A.-S.K. Pathan, Editor. October 2010, Auerbach Publication: CRC Press, Taylor &amp; Francis Group, USA."},{"key":"e_1_3_2_1_2_1","first-page":"13","volume-title":"MWNS-09 co-located with IFIP Networking 2009 Conference","author":"Malkani Y. A.","unstructured":"Malkani , Y. A. , et al., Towards a General System for Secure Device Pairing by Demonstration of Physical Proximity , in MWNS-09 co-located with IFIP Networking 2009 Conference , Shaker Verlag: Aachen, Germany. ISBN: 978-3-8322-8177-9. p. 13 -- 24 . Malkani, Y. A., et al., Towards a General System for Secure Device Pairing by Demonstration of Physical Proximity, in MWNS-09 co-located with IFIP Networking 2009 Conference, Shaker Verlag: Aachen, Germany. ISBN: 978-3-8322-8177-9. p. 13--24."},{"key":"e_1_3_2_1_3_1","volume-title":"Pre-Authentication using Infrared Privacy, Security, and Trust Within the Context of Pervasive Computing","author":"Spahic A.","year":"2005","unstructured":"Spahic , A. , et al. , Pre-Authentication using Infrared Privacy, Security, and Trust Within the Context of Pervasive Computing , 2005 . Vol. 780: p. 105-- 112 . Spahic, A., et al., Pre-Authentication using Infrared Privacy, Security, and Trust Within the Context of Pervasive Computing, 2005. Vol. 780: p. 105--112."},{"key":"e_1_3_2_1_4_1","volume-title":"Symposium on Network and Distributed Systems Security (NDSS '02)","author":"Balfanz D.","year":"2002","unstructured":"Balfanz , D. , et al. Talking to strangers: Authentication in adhoc wireless networks . in Symposium on Network and Distributed Systems Security (NDSS '02) . 2002 . Balfanz, D., et al. Talking to strangers: Authentication in adhoc wireless networks. in Symposium on Network and Distributed Systems Security (NDSS '02). 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370618"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741340"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758168"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784404.1784407"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_21"},{"key":"e_1_3_2_1_13_1","volume-title":"BEDA: Button-Enabled Device Association. in Internation Workshop on Security and Spontaneous Interaction (IWSSI 2007","author":"Soriente C.","year":"2007","unstructured":"Soriente , C. , G. Tsudik , and E. Uzun . BEDA: Button-Enabled Device Association. in Internation Workshop on Security and Spontaneous Interaction (IWSSI 2007 ). 2007 . Soriente, C., G. Tsudik, and E. Uzun. BEDA: Button-Enabled Device Association. in Internation Workshop on Security and Spontaneous Interaction (IWSSI 2007). 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067177"},{"key":"e_1_3_2_1_17_1","volume-title":"UbiComp 2007: Ubiquitous Computing.","author":"Varshavsky A.","year":"2007","unstructured":"Varshavsky , A. , et al., Amigo : Proximity-Based Authentication of Mobile Devices , in UbiComp 2007: Ubiquitous Computing. 2007 . p. 253--270. Varshavsky, A., et al., Amigo: Proximity-Based Authentication of Mobile Devices, in UbiComp 2007: Ubiquitous Computing. 2007. p. 253--270."},{"key":"e_1_3_2_1_18_1","first-page":"29","author":"Gehrmann C.","year":"2004","unstructured":"Gehrmann , C. and C. J. Mitchell , Manual Authentication for Wireless Devices. RSA Cryptobytes , 2004 . Vol. 7(1): p. 29 -- 37 . Gehrmann, C. and C. J. Mitchell, Manual Authentication for Wireless Devices. RSA Cryptobytes, 2004. Vol. 7(1): p. 29--37.","journal-title":"Manual Authentication for Wireless Devices. RSA Cryptobytes"},{"key":"e_1_3_2_1_19_1","first-page":"172","author":"Stajano F.","year":"2000","unstructured":"Stajano , F. and R. Anderson , The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, in Security Protocols. 2000 . p. 172 -- 182 . Stajano, F. and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, in Security Protocols. 2000. p. 172--182.","journal-title":"The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, in Security Protocols."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_21_1","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"Schneier B.","year":"1996","unstructured":"Schneier , B. , Applied Cryptography: Protocols, Algorithms and Source Code in C . 2 nd ed. 1996 . Schneier, B., Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd ed. 1996.","edition":"2"},{"key":"e_1_3_2_1_22_1","volume-title":"Products for USB Sensing and Control","author":"Phidgets","year":"2010","unstructured":"Phidgets : Products for USB Sensing and Control . 2010 . Phidgets: Products for USB Sensing and Control. 2010."},{"key":"e_1_3_2_1_23_1","unstructured":"Oracle Berkeley DB XML. {cited April 2010}; Available from: http:\/\/www.oracle.com\/database\/berkeley-db\/xml\/index.html. Oracle Berkeley DB XML . {cited April 2010}; Available from: http:\/\/www.oracle.com\/database\/berkeley-db\/xml\/index.html."},{"key":"e_1_3_2_1_24_1","volume-title":"Java Programming with Berkeley DBXML. 2010 {cited","author":"Mimaroglu S.","year":"2010","unstructured":"Mimaroglu , S. Java Programming with Berkeley DBXML. 2010 {cited April , 2010 }; Available from: http:\/\/linux.sys-con.com\/node\/175405. Mimaroglu, S. Java Programming with Berkeley DBXML. 2010 {cited April, 2010}; Available from: http:\/\/linux.sys-con.com\/node\/175405."},{"key":"e_1_3_2_1_25_1","volume-title":"W3C NOTE-CCPP-19990727","author":"Reynolds F.","year":"1999","unstructured":"Reynolds , F. , et al. , Composite Capability \/ Preference Profiles (CC\/PP): A User Side Framework for Content Negotiation , W3C NOTE-CCPP-19990727 , July 1999 , url: http:\/\/www.w3.org\/TR\/NOTE-CCPP\/. Reynolds, F., et al., Composite Capability \/ Preference Profiles (CC\/PP): A User Side Framework for Content Negotiation, W3C NOTE-CCPP-19990727, July 1999, url: http:\/\/www.w3.org\/TR\/NOTE-CCPP\/."}],"event":{"name":"FIT '10: 8th International Conference on Frontiers of Information Technology","sponsor":["HEC Higher Education Commission, Pakistan","COMSATS Institute of Information Technology","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Islamabad Pakistan","acronym":"FIT '10"},"container-title":["Proceedings of the 8th International Conference on Frontiers of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943628.1943649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1943628.1943649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:40Z","timestamp":1750243960000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943628.1943649"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,21]]},"references-count":23,"alternative-id":["10.1145\/1943628.1943649","10.1145\/1943628"],"URL":"https:\/\/doi.org\/10.1145\/1943628.1943649","relation":{},"subject":[],"published":{"date-parts":[[2010,12,21]]},"assertion":[{"value":"2010-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}