{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:50Z","timestamp":1773511070951,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Nanyang Technological University","award":["Start-up Grant"],"award-info":[{"award-number":["Start-up Grant"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3300061.3300118","type":"proceedings-article","created":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T13:20:41Z","timestamp":1565011241000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials"],"prefix":"10.1145","author":[{"given":"Zhenyu","family":"Yan","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Qun","family":"Song","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Rui","family":"Tan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"given":"Adams Wai Kin","family":"Kong","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adafruit. 2018. Adafruit FLORA. https:\/\/www.adafruit.com\/category\/92 Retrieved November 21 2018 from  Adafruit. 2018. Adafruit FLORA. https:\/\/www.adafruit.com\/category\/92 Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5116816"},{"key":"e_1_3_2_1_3_1","unstructured":"T Barill. 2003. An ECG primer. Nursecom Educational Technologies Vancouver BC Canada 63--100.  T Barill. 2003. An ECG primer. Nursecom Educational Technologies Vancouver BC Canada 63--100."},{"key":"e_1_3_2_1_4_1","volume-title":"Body Area Network Security: Robust Key Establishment Using Human Body Channel. In The 3rd USENIX Workshop on Health Security and Privacy (HealthSec '12)","author":"Chang Sang-Yoon","year":"2012"},{"key":"e_1_3_2_1_5_1","unstructured":"Emerson Electric Co. 2018. Greenlee CS-8000 Circuit Seeker. https:\/\/www.greenlee.com\/catalog\/product.aspx?product_id=19199 Retrieved November 21 2018 from  Emerson Electric Co. 2018. Greenlee CS-8000 Circuit Seeker. https:\/\/www.greenlee.com\/catalog\/product.aspx?product_id=19199 Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370233"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208330"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979058"},{"key":"e_1_3_2_1_9_1","unstructured":"Duo. 2018. Using Duo With a Hardware Token - Guide to Two-Factor Authentication \u00b7 Duo Security. https:\/\/guide.duo.com\/tokens Retrieved November 21 2018 from  Duo. 2018. Using Duo With a Hardware Token - Guide to Two-Factor Authentication \u00b7 Duo Security. https:\/\/guide.duo.com\/tokens Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2013.6487036"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_5"},{"key":"e_1_3_2_1_13_1","unstructured":"Gartner. 2014. https:\/\/www.gartner.com\/newsroom\/id\/2839717 Retrieved November 21 2018 from  Gartner. 2014. https:\/\/www.gartner.com\/newsroom\/id\/2839717 Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906402"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025808"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971682"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807458"},{"key":"e_1_3_2_1_19_1","volume-title":"The 32th IEEE International Conference on Computer Communications (INFOCOM '13)","author":"Hu C."},{"key":"e_1_3_2_1_20_1","unstructured":"KETI. 2009. Kmote - KETI mote. http:\/\/tinyos.stanford.edu\/tinyos-wiki\/index.php\/Kmote Retrieved November 21 2018 from  KETI. 2009. Kmote - KETI mote. http:\/\/tinyos.stanford.edu\/tinyos-wiki\/index.php\/Kmote Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jea.7500165"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807481"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348611"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/851037.856526"},{"key":"e_1_3_2_1_26_1","unstructured":"Benjamin Mayo. 2018. Face ID deemed too costly to copy Android makers target in-display fingerprint sensors instead. https:\/\/9to5mac.com\/2018\/03\/23\/face-id-premium-android-fingerprint-sensors\/ Retrieved November 21 2018 from  Benjamin Mayo. 2018. Face ID deemed too costly to copy Android makers target in-display fingerprint sensors instead. https:\/\/9to5mac.com\/2018\/03\/23\/face-id-premium-android-fingerprint-sensors\/ Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_27_1","unstructured":"David Moss and Philip Levis. 2007. Packet Link Layer. https:\/\/github.com\/tinyos\/tinyos-main\/blob\/master\/doc\/txt\/tep127.txt Retrieved November 21 2018 from  David Moss and Philip Levis. 2007. Packet Link Layer. https:\/\/github.com\/tinyos\/tinyos-main\/blob\/master\/doc\/txt\/tep127.txt Retrieved November 21 2018 from"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEMSTECH.2018.8365707"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124873"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1364\/OE.18.010762"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1088\/0957-0233\/23\/11\/115101"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.2964185"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"E.M. Purcell and D.J. Morin. 2013. Electricity and Magnetism 3 ed.). Cambridge University Press Cambridge UK.  E.M. Purcell and D.J. Morin. 2013. Electricity and Magnetism 3 ed.). Cambridge University Press Cambridge UK.","DOI":"10.1017\/CBO9781139012973"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1664-3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23076"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Corinna Schmitt Thomas Kothmayr Wen Hu and Burkhard Stiller. 2017. Two-Way Authentication for the Internet-of-Things. Springer International Publishing Cham 27--56.  Corinna Schmitt Thomas Kothmayr Wen Hu and Burkhard Stiller. 2017. Two-Way Authentication for the Internet-of-Things. Springer International Publishing Cham 27--56.","DOI":"10.1007\/978-3-319-53472-5_2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1299\/jamdsm.1.294"},{"key":"e_1_3_2_1_40_1","volume-title":"WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. In IEEE European Symposium on Security and Privacy (Oaklawn '17)","author":"Trippel Timothy","year":"2017"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2037617"},{"key":"e_1_3_2_1_42_1","volume-title":"Radiation at Home, Outdoots and in the Workplace, Dag Brune, Ragnar Hellborg, Bertil R","author":"Vistnes Arnt I."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348569"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804271"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185520.2185561"},{"key":"e_1_3_2_1_46_1","volume-title":"The 30th IEEE International Conference on Computer Communications (INFOCOM '11)","author":"Xu F.","year":"1862"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2959355.2959358"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131681"},{"key":"e_1_3_2_1_49_1","volume-title":"2016 IEEE International Conference on RFID (RFID). IEEE","author":"Yang Chouchang"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130984"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994556"},{"key":"e_1_3_2_1_52_1","unstructured":"Thoams Guthrie Zimmerman. 1995. Personal area networks (PAN): Near-field intra-body communication. Ph.D. Dissertation. Massachusetts Institute of Technology.  Thoams Guthrie Zimmerman. 1995. Personal area networks (PAN): Near-field intra-body communication. Ph.D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_53_1","unstructured":"Zolertia Inc. 2018. Z1 mote. https:\/\/github.com\/Zolertia\/Resources\/wiki\/The-Z1-mote Retrieved November 21 2018 from  Zolertia Inc. 2018. Z1 mote. https:\/\/github.com\/Zolertia\/Resources\/wiki\/The-Z1-mote Retrieved November 21 2018 from"}],"event":{"name":"MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking","location":"Los Cabos Mexico","acronym":"MobiCom '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["The 25th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3300118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3300061.3300118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:52Z","timestamp":1750202632000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3300118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":53,"alternative-id":["10.1145\/3300061.3300118","10.1145\/3300061"],"URL":"https:\/\/doi.org\/10.1145\/3300061.3300118","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}