{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:08:06Z","timestamp":1770138486675,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Hessen State Ministry for Higher Education, Research and the Arts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3395351.3399420","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:29:10Z","timestamp":1595392150000},"page":"31-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Acoustic integrity codes"],"prefix":"10.1145","author":[{"given":"Florentin","family":"Putz","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Flor","family":"\u00c1lvarez","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Jiska","family":"Classen","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Strangers: Authentication in Ad-Hoc Wireless Networks. In NDSS.","author":"Balfanz D.","year":"2002"},{"key":"e_1_3_2_1_2_1","unstructured":"S. Brands and D. Chaum. 1994. Distance-Bounding Protocols. In Advances in Cryptology --- EUROCRYPT '93. Springer Berlin Heidelberg Berlin Heidelberg 344--359. isbn: 978-3-540-48285-7.  S. Brands and D. Chaum. 1994. Distance-Bounding Protocols. In Advances in Cryptology --- EUROCRYPT '93. Springer Berlin Heidelberg Berlin Heidelberg 344--359. isbn: 978-3-540-48285-7."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2009.5335562"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_6_1","unstructured":"N. Ferguson B. Schneier and T. Kohno. 2010. Cryptography Engineering. Wiley Publishing Inc.  N. Ferguson B. Schneier and T. Kohno. 2010. Cryptography Engineering. Wiley Publishing Inc."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2748278"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314397"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00055"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC'11)","author":"Gollakota S.","year":"2028"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023426"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2006.52"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866319"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627400"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714617"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.009"},{"key":"e_1_3_2_1_18_1","unstructured":"J. Katz A. J. Menezes P. C. Van Oorschot and S. A. Vanstone. 1996. Handbook of Applied Cryptography. CRC press.  J. Katz A. J. Menezes P. C. Van Oorschot and S. A. Vanstone. 1996. Handbook of Applied Cryptography. CRC press."},{"key":"e_1_3_2_1_19_1","unstructured":"T. Kindberg and K. Zhang. 2003. Validating and Securing Spontaneous Associations between Wireless Devices. In Information Security. Springer Berlin Heidelberg Berlin Heidelberg 44--53. isbn: 978-3-540-39981-0.  T. Kindberg and K. Zhang. 2003. Validating and Securing Spontaneous Associations between Wireless Devices. In Information Security. Springer Berlin Heidelberg Berlin Heidelberg 44--53. isbn: 978-3-540-39981-0."},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Foundation Kotlin","year":"2019"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPAA.2001.969582"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2012.43"},{"key":"e_1_3_2_1_23_1","volume-title":"Lancaster University, (Oct.","author":"Mayrhofer R.","year":"2006"},{"key":"e_1_3_2_1_24_1","volume-title":"Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. In UbiComp 2007: Ubiquitous Computing","author":"Mayrhofer R.","year":"2007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319720"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2017.2751600"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555831"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"C. P\u00f6pper N. O. Tippenhauer B. Danev and S. Capkun. 2011. Investigation of Signal and Message Manipulations on the Wireless Channel. In Computer Security - ESORICS 2011. Springer Berlin Heidelberg Berlin Heidelberg 40--59. isbn: 978-3-642-23822-2.  C. P\u00f6pper N. O. Tippenhauer B. Danev and S. Capkun. 2011. Investigation of Signal and Message Manipulations on the Wireless Channel. In Computer Security - ESORICS 2011. Springer Berlin Heidelberg Berlin Heidelberg 40--59. isbn: 978-3-642-23822-2.","DOI":"10.1007\/978-3-642-23822-2_3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_20"},{"key":"e_1_3_2_1_31_1","unstructured":"J. G. Proakis. 2002. Communication Systems Engineering. (2nd ed.). Prentice Hall Upper Saddle River N.J. isbn: 0130617938.  J. G. Proakis. 2002. Communication Systems Engineering. (2nd ed.). Prentice Hall Upper Saddle River N.J. isbn: 0130617938."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"F. Putz. 2020. Acoustic Integrity Codes Android Prototype. https:\/\/seemoo.de\/aic-prototype.  F. Putz. 2020. Acoustic Integrity Codes Android Prototype. https:\/\/seemoo.de\/aic-prototype.","DOI":"10.1145\/3395351.3399420"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02741-8_32"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"T. D. Rossing (Ed.) 2007. Springer Handbook of Acoustics. Springer.  T. D. Rossing (Ed.) 2007. Springer Handbook of Acoustics. Springer.","DOI":"10.1007\/978-0-387-30425-0"},{"key":"e_1_3_2_1_35_1","first-page":"01","volume-title":"Inaudible Voice Commands: The Long-Range Attack and Defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Roy N.","year":"2018"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2011.271"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2604221"},{"key":"e_1_3_2_1_38_1","unstructured":"J. Six. 2015. Digital Sound Processing and Java. Documentation for the TarsosDSP Audio Processing Library. (2.3 ed.). IPEM Ghent University. (May 2015).  J. Six. 2015. Digital Sound Processing and Java. Documentation for the TarsosDSP Audio Processing Library. (2.3 ed.). IPEM Ghent University. (May 2015)."},{"key":"e_1_3_2_1_39_1","volume-title":"Audio Engineering Society Conference: 53rd International Conference: Semantic Audio. (Jan.","author":"Six J.","year":"2014"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Linz Austria","acronym":"WiSec '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399420","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399420"}},"subtitle":["secure device pairing using short-range acoustic communication"],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":41,"alternative-id":["10.1145\/3395351.3399420","10.1145\/3395351"],"URL":"https:\/\/doi.org\/10.1145\/3395351.3399420","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}