{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:23:59Z","timestamp":1750397039800,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3144457.3144468","type":"proceedings-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T12:22:08Z","timestamp":1534854128000},"page":"393-402","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Wi-Auth"],"prefix":"10.1145","author":[{"given":"Syed W.","family":"Shah","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW"}]},{"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Allan Darren","year":"2015","unstructured":"Darren Allan . 2015 . We all have too many online accounts and can't remember the passwords (June 2015) . Retrieved April 20, 2017 from http:\/\/www.itproportal.com\/2015\/07\/23\/we-all-have-too-many-online-accounts-and-cant-remember-the-passwords\/ Darren Allan. 2015. We all have too many online accounts and can't remember the passwords (June 2015). Retrieved April 20, 2017 from http:\/\/www.itproportal.com\/2015\/07\/23\/we-all-have-too-many-online-accounts-and-cant-remember-the-passwords\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Just Make It Hack Me. (Jan. 2010)","author":"Vance Ashlee","year":"2010","unstructured":"Ashlee Vance . 2010 . If your password is 123456 , Just Make It Hack Me. (Jan. 2010) Retrieved April 22, 2017 from http:\/\/www.nytimes.com\/2010\/01\/21\/technology\/21password.html Ashlee Vance. 2010. If your password is 123456, Just Make It Hack Me. (Jan. 2010) Retrieved April 22, 2017 from http:\/\/www.nytimes.com\/2010\/01\/21\/technology\/21password.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 24th USENIX Security Symposium (USENIX Security'15)","author":"Karapanos Nikolaos","year":"2015","unstructured":"Nikolaos Karapanos , Claudio Marforio , Claudio Soriente and Srdjan Capkun . 2015 . Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound . In Proceedings of 24th USENIX Security Symposium (USENIX Security'15) . USENIX Association, Berkeley, USA, 483--498. DOI: https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/karapanos. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In Proceedings of 24th USENIX Security Symposium (USENIX Security'15). USENIX Association, Berkeley, USA, 483--498. DOI: https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/karapanos."},{"key":"e_1_3_2_1_5_1","unstructured":"RSA. RSA SecureID. Retrieved 26 June 2017 from https:\/\/www.rsa.com\/en-us\/products\/rsa-securid-suite\/securid-hardware-tokens  RSA. RSA SecureID. Retrieved 26 June 2017 from https:\/\/www.rsa.com\/en-us\/products\/rsa-securid-suite\/securid-hardware-tokens"},{"key":"e_1_3_2_1_6_1","unstructured":"yubico. Yubikeys. Retrieved 26 June 2017 from https:\/\/www.yubico.com\/products\/yubikey-hardware\/  yubico. Yubikeys. Retrieved 26 June 2017 from https:\/\/www.yubico.com\/products\/yubikey-hardware\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382240"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_1"},{"key":"e_1_3_2_1_9_1","volume-title":"proceedings of Network and Distributed System Security Symposium (NDSS'14)","author":"Shirvanian Maliheh","year":"2014","unstructured":"Maliheh Shirvanian , Stanislaw Jarecki , Nitesh Saxena and Naveen Nathan . 2014 . Two-factor authentication resilient to server compromise using mixbandwidth devices , In proceedings of Network and Distributed System Security Symposium (NDSS'14) . Internet Society, San Diego, CA, USA, 1--16. Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena and Naveen Nathan. 2014. Two-factor authentication resilient to server compromise using mixbandwidth devices, In proceedings of Network and Distributed System Security Symposium (NDSS'14). Internet Society, San Diego, CA, USA, 1--16."},{"key":"e_1_3_2_1_10_1","volume-title":"The Sound-Based Password Alternative. Retrieved","author":"Kumparak Greg","year":"2017","unstructured":"Greg Kumparak . 2014. Google Acquires SlickLogin , The Sound-Based Password Alternative. Retrieved 10 May , 2017 from https:\/\/techcrunch.com\/2014\/02\/16\/google-acquires-slicklogin-the-sound-based-password-alternative\/ Greg Kumparak. 2014. Google Acquires SlickLogin, The Sound-Based Password Alternative. Retrieved 10 May, 2017 from https:\/\/techcrunch.com\/2014\/02\/16\/google-acquires-slicklogin-the-sound-based-password-alternative\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Enhancements for higher throughput","author":"Std IEEE","year":"2009","unstructured":"IEEE Std . 2009. 802.11n-2009 : Enhancements for higher throughput , 2009 ., Retrieved 01 Dec. 2016 from https:\/\/www.ieee802.org. IEEE Std. 2009. 802.11n-2009: Enhancements for higher throughput, 2009., Retrieved 01 Dec. 2016 from https:\/\/www.ieee802.org."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543592"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590321"},{"key":"e_1_3_2_1_14_1","first-page":"2","article-title":"A Singularly Valuable Decomposition: The SVD of a Matrix, The College Mathematics Journal","volume":"27","author":"Kalman Dan","year":"1996","unstructured":"Dan Kalman . 1996 . A Singularly Valuable Decomposition: The SVD of a Matrix, The College Mathematics Journal . MAA 27 ,1 (1996), 2 -- 23 . DOI: http:\/\/www.math.umn.edu\/ lerman\/math5467\/svd.pdf Dan Kalman. 1996. A Singularly Valuable Decomposition: The SVD of a Matrix, The College Mathematics Journal. MAA 27,1 (1996), 2--23. DOI: http:\/\/www.math.umn.edu\/ lerman\/math5467\/svd.pdf","journal-title":"MAA"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_3_2_1_16_1","volume-title":"We Recommend a Singular Value Decomposition","author":"Austin David","year":"2017","unstructured":"David Austin . We Recommend a Singular Value Decomposition . American Mathematical Society (AMS) . Retrieved June 20, 2017 from http:\/\/www.ams.org\/samplings\/feature-column\/fcarc-svd David Austin. We Recommend a Singular Value Decomposition. American Mathematical Society (AMS). Retrieved June 20, 2017 from http:\/\/www.ams.org\/samplings\/feature-column\/fcarc-svd"},{"key":"e_1_3_2_1_17_1","volume-title":"Van Loan","author":"Golub Gene H.","year":"1996","unstructured":"Gene H. Golub and Charles F . Van Loan . 1996 . Matrix Computations (3rd. ed.), The John Hopkin Press Ltd . London. Gene H. Golub and Charles F. Van Loan. 1996. Matrix Computations (3rd. ed.), The John Hopkin Press Ltd. London."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851203"},{"key":"e_1_3_2_1_19_1","volume-title":"The Current State of Authentication:We have a Password Problem (June","author":"Thomas Drew","year":"2016","unstructured":"Drew Thomas . 2016. The Current State of Authentication:We have a Password Problem (June 2016 ). Retrieved 10 May, 2017 from https:\/\/www.smashingmagazine.com\/2016\/06\/the-current-state-of-authentication-we-have-a-password-problem\/ Drew Thomas. 2016. The Current State of Authentication:We have a Password Problem (June 2016). Retrieved 10 May, 2017 from https:\/\/www.smashingmagazine.com\/2016\/06\/the-current-state-of-authentication-we-have-a-password-problem\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Duo Security INC. Duo Push. Retrieved 10 Jan 2017 from https:\/\/duo.com\/product\/trusted-users\/two-factor-authentication\/authentication-methods\/duo-push  Duo Security INC. Duo Push. Retrieved 10 Jan 2017 from https:\/\/duo.com\/product\/trusted-users\/two-factor-authentication\/authentication-methods\/duo-push"},{"key":"e_1_3_2_1_21_1","unstructured":"ENCAP SECURITY. Encap Security. Retrieved 15 Jan 2017 from https:\/\/www.encapsecurity.com\/  ENCAP SECURITY. Encap Security. Retrieved 15 Jan 2017 from https:\/\/www.encapsecurity.com\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Email","year":"2016","unstructured":"Email , recorded messages and SMS Scams . Retrieved December 18, 2016 from https:\/\/www.commbank.com.au\/news\/netbank-news-30.html Email, recorded messages and SMS Scams. Retrieved December 18, 2016 from https:\/\/www.commbank.com.au\/news\/netbank-news-30.html"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Snider Mike","year":"2016","unstructured":"Mike Snider and Elizabeth Weise . 2016 . 500 million Yahoo Accounts breached (Sep. 2016) . Retrieved March 13, 2017 from http:\/\/www.usatoday.com\/story\/tech\/2016\/09\/22\/report-yahoo-may-confirmmassive-data-breach\/90824934\/ Mike Snider and Elizabeth Weise. 2016. 500 million Yahoo Accounts breached (Sep. 2016). Retrieved March 13, 2017 from http:\/\/www.usatoday.com\/story\/tech\/2016\/09\/22\/report-yahoo-may-confirmmassive-data-breach\/90824934\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702457"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/547613"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464463"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790124"},{"key":"e_1_3_2_1_30_1","first-page":"7","article-title":"Evaluation of time-series data sets using the Pearson product-moment correlation coefficient","volume":"26","author":"Derrick TR","year":"1994","unstructured":"Derrick TR , Bates BT, Dufek JS. 1994 . Evaluation of time-series data sets using the Pearson product-moment correlation coefficient . Med Sci Sports Exerc. NCBI 26 , 7 (Jul 1994), 919--28. DOI: https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/7934769 Derrick TR, Bates BT, Dufek JS. 1994. Evaluation of time-series data sets using the Pearson product-moment correlation coefficient. Med Sci Sports Exerc. NCBI 26, 7 (Jul 1994), 919--28. DOI: https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/7934769","journal-title":"Med Sci Sports Exerc. NCBI"}],"event":{"name":"MobiQuitous 2017: Computing, Networking and Services","sponsor":["EAI The European Alliance for Innovation","SIGMM ACM Special Interest Group on Multimedia"],"location":"Melbourne VIC Australia","acronym":"MobiQuitous 2017"},"container-title":["Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3144457.3144468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:22Z","timestamp":1750212802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144468"}},"subtitle":["WiFi based Second Factor User Authentication"],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":30,"alternative-id":["10.1145\/3144457.3144468","10.1145\/3144457"],"URL":"https:\/\/doi.org\/10.1145\/3144457.3144468","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}