{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:40:13Z","timestamp":1762004413588,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T00:00:00Z","timestamp":1348185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,21]]},"DOI":"10.1145\/2371664.2371705","type":"proceedings-article","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T23:48:43Z","timestamp":1348616923000},"page":"185-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Magnetic signatures in air for mobile devices"],"prefix":"10.1145","author":[{"given":"Hamed","family":"Ketabdar","sequence":"first","affiliation":[{"name":"Telekom Innovation Labs, Quality and Usability Lab, Berlin, Germany"}]},{"given":"Peyman","family":"Moghadam","sequence":"additional","affiliation":[{"name":"Autonomous Systems Laboratory, CSIRO ICT Centre, Brisbane, Australia"}]},{"given":"Babak","family":"Naderi","sequence":"additional","affiliation":[{"name":"Telekom Innovation Labs, TU Berlin, Berlin, Germany"}]},{"given":"Mehran","family":"Roshandel","sequence":"additional","affiliation":[{"name":"Telekom Innovation Labs, TU Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Automation & Test in Europe","author":"Aaraj N.","year":"2006","unstructured":"N. Aaraj , S. Ravi , A. Raghunathan , and N. K. Jha , \" Architectures for Efficient Face Authentication in Embedded Systems,\" Proc. Design , Automation & Test in Europe , March 2006 . N. Aaraj, S. Ravi, A. Raghunathan, and N. K. Jha, \"Architectures for Efficient Face Authentication in Embedded Systems,\" Proc. Design, Automation & Test in Europe, March 2006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_61"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065643"},{"key":"e_1_3_2_1_4_1","volume-title":"The Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies","author":"Ketabdar H.","year":"2010","unstructured":"H. Ketabdar , K. A. Yuksel , A. JahanBekam , M. Roshandel , and D. Skripko , MagiSign: User Identification\/Authentication Based on 3D Around Device Magnetic Signatures , The Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies , 2010 . H. Ketabdar, K. A. Yuksel, A. JahanBekam, M. Roshandel, and D. Skripko, MagiSign: User Identification\/Authentication Based on 3D Around Device Magnetic Signatures, The Fourth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, 2010."}],"event":{"name":"MobileHCI '12: 14th International Conference on Human Computer Interaction with Mobile Devices and Services","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Francisco California USA","acronym":"MobileHCI '12"},"container-title":["Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371664.2371705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2371664.2371705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:18Z","timestamp":1750238478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371664.2371705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,21]]},"references-count":4,"alternative-id":["10.1145\/2371664.2371705","10.1145\/2371664"],"URL":"https:\/\/doi.org\/10.1145\/2371664.2371705","relation":{},"subject":[],"published":{"date-parts":[[2012,9,21]]},"assertion":[{"value":"2012-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}