{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:34:16Z","timestamp":1756384456373,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1845469"],"award-info":[{"award-number":["CNS-1845469"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,18]]},"DOI":"10.1145\/3412382.3458899","type":"proceedings-article","created":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T23:56:47Z","timestamp":1621555007000},"page":"93-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Moonshine"],"prefix":"10.1145","author":[{"given":"Jack","family":"West","sequence":"first","affiliation":[{"name":"Loyola University Chicago"}]},{"given":"Kyuin","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Suman","family":"Banerjee","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Younghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"George K.","family":"Thiruvathukal","sequence":"additional","affiliation":[{"name":"Loyola University Chicago"}]},{"given":"Neil","family":"Klingensmith","sequence":"additional","affiliation":[{"name":"Loyola University Chicago"}]}],"member":"320","published-online":{"date-parts":[[2021,5,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900023"},{"volume-title":"[n. d.]. Elements of Information Theory","author":"Cover Thomas M.","key":"e_1_3_2_1_4_1","unstructured":"Thomas M. Cover and Joy A. Thomas . [n. d.]. Elements of Information Theory . Wiley, Hoboken , New Jersey . Thomas M. Cover and Joy A. Thomas. [n. d.]. Elements of Information Theory. Wiley, Hoboken, New Jersey."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. Eurocrypt","volume":"4","author":"Dodis Yevgeniy","year":"2004","unstructured":"Yevgeniy Dodis , Leonid Reyzin , and Adam Smith . 2004 . Fuzzy extractors and cryptography, or how to use your fingerprints . In Proc. Eurocrypt , Vol. 4 . Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy extractors and cryptography, or how to use your fingerprints. In Proc. Eurocrypt, Vol. 4."},{"key":"e_1_3_2_1_7_1","volume-title":"Unconventional cryptographic keying variable management. Communications","author":"Hershey John E.","year":"1995","unstructured":"John E. Hershey , Amer Hassan , and Rao Yarlagadda . 1995. Unconventional cryptographic keying variable management. Communications , IEEE Transactions on 43 (02 1995 ), 3 - 6. https:\/\/doi.org\/10.1109\/26.385951 10.1109\/26.385951 John E. Hershey, Amer Hassan, and Rao Yarlagadda. 1995. Unconventional cryptographic keying variable management. Communications, IEEE Transactions on 43 (02 1995), 3 - 6. https:\/\/doi.org\/10.1109\/26.385951"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053159"},{"key":"#cr-split#-e_1_3_2_1_9_1.1","unstructured":"Mikhail Fomichev Max Maass Lars Almon Alejandro Molina and Matthias Hollick. 2019. Index of supplementary files from \"Perils of Zero- Interaction Security in the Internet of Things\". https:\/\/doi.org\/10.5281\/zenodo.2537721 10.5281\/zenodo.2537721"},{"key":"#cr-split#-e_1_3_2_1_9_1.2","doi-asserted-by":"crossref","unstructured":"Mikhail Fomichev Max Maass Lars Almon Alejandro Molina and Matthias Hollick. 2019. Index of supplementary files from \"Perils of Zero- Interaction Security in the Internet of Things\". https:\/\/doi.org\/10.5281\/zenodo.2537721","DOI":"10.1145\/3314397"},{"key":"#cr-split#-e_1_3_2_1_10_1.1","unstructured":"Mikhail Fomichev Max Maass Lars Almon Alejandro Molina and Matthias Hollick. 2019. Processed data from Office scenario from \"Perils of Zero-Interaction Security in the Internet of Things\". https:\/\/doi.org\/10.5281\/zenodo.2537707 10.5281\/zenodo.2537707"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"Mikhail Fomichev Max Maass Lars Almon Alejandro Molina and Matthias Hollick. 2019. Processed data from Office scenario from \"Perils of Zero-Interaction Security in the Internet of Things\". https:\/\/doi.org\/10.5281\/zenodo.2537707","DOI":"10.1145\/3314397"},{"volume-title":"Probability and Random Processes for Electrical and Computer Engineers","author":"Gubner John A.","key":"e_1_3_2_1_11_1","unstructured":"John A. Gubner . 2006. Probability and Random Processes for Electrical and Computer Engineers . Cambridge University Press , New York, NY, USA . John A. Gubner. 2006. Probability and Random Processes for Electrical and Computer Engineers. Cambridge University Press, New York, NY, USA."},{"volume-title":"Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom '09)","author":"Jana Suman","key":"e_1_3_2_1_12_1","unstructured":"Suman Jana , Sriram Nandha Premnath , Mike Clark , Sneha K. Kasera , Neal Patwari , and Srikanth V. Krishnamurthy . 2009. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments . In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom '09) . ACM, New York, NY, USA, 321--332. https:\/\/doi.org\/10.1145\/1614320.1614356 10.1145\/1614320.1614356 Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. 2009. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom '09). ACM, New York, NY, USA, 321--332. https:\/\/doi.org\/10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351251"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399436"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310406"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"volume-title":"Shake Well Before Use: Authentication Based on Accelerometer Data","author":"Mayrhofer Rene","key":"e_1_3_2_1_21_1","unstructured":"Rene Mayrhofer and Hans Gellersen . 2007. Shake Well Before Use: Authentication Based on Accelerometer Data . In Pervasive Computing, Anthony LaMarca, Marc Langheinrich, and Khai N. Truong (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 144--161. Rene Mayrhofer and Hans Gellersen. 2007. Shake Well Before Use: Authentication Based on Accelerometer Data. In Pervasive Computing, Anthony LaMarca, Marc Langheinrich, and Khai N. Truong (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 144--161."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 55th Annual Design Automation Conference (DAC '18)","author":"Miettinen Markus","year":"1959","unstructured":"Markus Miettinen , Thien Duc Nguyen , Ahmad-Reza Sadeghi , and N. Asokan . 2018. Revisiting Context-based Authentication in IoT . In Proceedings of the 55th Annual Design Automation Conference (DAC '18) . ACM, New York, NY, USA, Article 32, 6 pages. https:\/\/doi.org\/10.1145\/3 1959 70.3196106 10.1145\/3195970.3196106 Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and N. Asokan. 2018. Revisiting Context-based Authentication in IoT. In Proceedings of the 55th Annual Design Automation Conference (DAC '18). ACM, New York, NY, USA, Article 32, 6 pages. https:\/\/doi.org\/10.1145\/3195970.3196106"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"e_1_3_2_1_25_1","unstructured":"Andrew Rukhin Juan Soto James Nechvatal Miles Smid Elaine Barker Stefan Leigh Mark Levenson Mark Vangel David Banks Alan Heckert James Dray and San Vo. [n. d.]. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. ([n. d.]).  Andrew Rukhin Juan Soto James Nechvatal Miles Smid Elaine Barker Stefan Leigh Mark Levenson Mark Vangel David Banks Alan Heckert James Dray and San Vo. [n. d.]. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. ([n. d.])."},{"key":"e_1_3_2_1_26_1","first-page":"313","volume-title":"2006 IEEE Symposium on Security and Privacy (SP'06)","author":"Saxena Nitesh","unstructured":"Nitesh Saxena , Jan-Erik Ekberg , Kari Kostiainen , and N. Asokan . 2006. Secure device pairing based on a visual channel . In 2006 IEEE Symposium on Security and Privacy (SP'06) . 6 pp.- 313 . https:\/\/doi.org\/10.1109\/SP.2006.35 10.1109\/SP.2006.35 Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan. 2006. Secure device pairing based on a visual channel. In 2006 IEEE Symposium on Security and Privacy (SP'06). 6 pp.-313. https:\/\/doi.org\/10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_3_2_1_29_1","volume-title":"Hien Thi Thu Truong, and N. Asokan","author":"Shrestha Babins","year":"2014","unstructured":"Babins Shrestha , Nitesh Saxena , Hien Thi Thu Truong, and N. Asokan . 2014 . Drone to the Rescue : Relay-Resilient Authentication using Ambient Multi-sensing. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 349--364. Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, and N. Asokan. 2014. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 349--364."},{"key":"#cr-split#-e_1_3_2_1_30_1.1","unstructured":"Joachim Thiemann Nobutaka Ito and Emmanuel Vincent. 2013. DEMAND: a collection of multi-channel recordings of acoustic noise in diverse environments. https:\/\/doi.org\/10.5281\/zenodo.1227121 Supported by Inria under the Associate Team Program VERSAMUS. 10.5281\/zenodo.1227121"},{"key":"#cr-split#-e_1_3_2_1_30_1.2","unstructured":"Joachim Thiemann Nobutaka Ito and Emmanuel Vincent. 2013. DEMAND: a collection of multi-channel recordings of acoustic noise in diverse environments. https:\/\/doi.org\/10.5281\/zenodo.1227121 Supported by Inria under the Associate Team Program VERSAMUS."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867635.1867644"},{"key":"e_1_3_2_1_32_1","volume-title":"Amigo: Proximity-Based Authentication of Mobile Devices. In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D","author":"Varshavsky Alex","year":"2007","unstructured":"Alex Varshavsky , Adin Scannell , Anthony LaMarca , and Eyal de Lara . 2007 . Amigo: Proximity-Based Authentication of Mobile Devices. In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D . Abowd, Aruna Seneviratne, and Thomas Strang (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 253--270. Alex Varshavsky, Adin Scannell, Anthony LaMarca, and Eyal de Lara. 2007. Amigo: Proximity-Based Authentication of Mobile Devices. In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D. Abowd, Aruna Seneviratne, and Thomas Strang (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 253--270."},{"key":"e_1_3_2_1_33_1","first-page":"36","article-title":"13. various techniques used in connection with random digits","volume":"12","author":"Neumann John Von","year":"1951","unstructured":"John Von Neumann . 1951 . 13. various techniques used in connection with random digits . Appl. Math Ser 12 , 36 - 38 (1951), 5. John Von Neumann. 1951. 13. various techniques used in connection with random digits. Appl. Math Ser 12, 36-38 (1951), 5.","journal-title":"Appl. Math Ser"},{"key":"#cr-split#-e_1_3_2_1_34_1.1","unstructured":"Jack West Kyuin Lee Younghyun Kim George K. Thiruvathukal and Neil Klingensmith. 2021. Moonshine Context-Based Authentication Harvested Data. https:\/\/doi.org\/10.5281\/zenodo.4579965 10.5281\/zenodo.4579965"},{"key":"#cr-split#-e_1_3_2_1_34_1.2","doi-asserted-by":"crossref","unstructured":"Jack West Kyuin Lee Younghyun Kim George K. Thiruvathukal and Neil Klingensmith. 2021. Moonshine Context-Based Authentication Harvested Data. https:\/\/doi.org\/10.5281\/zenodo.4579965","DOI":"10.1145\/3412382.3458899"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994556"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/TITB.2012.2206115","article-title":"ECG-Cryptography and Authentication in Body Area Networks","volume":"16","author":"Zhang Zhaoyang","year":"2012","unstructured":"Zhaoyang Zhang , Honggang Wang , Athanasios V. Vasilakos , and Hua Fang . 2012 . ECG-Cryptography and Authentication in Body Area Networks . IEEE Transactions on Information Technology in Biomedicine 16 , 6 (Nov 2012), 1070--1078. https:\/\/doi.org\/10.1109\/TITB.2012.2206115 10.1109\/TITB.2012.2206115 Zhaoyang Zhang, Honggang Wang, Athanasios V. Vasilakos, and Hua Fang. 2012. ECG-Cryptography and Authentication in Body Area Networks. IEEE Transactions on Information Technology in Biomedicine 16, 6 (Nov 2012), 1070--1078. https:\/\/doi.org\/10.1109\/TITB.2012.2206115","journal-title":"IEEE Transactions on Information Technology in Biomedicine"}],"event":{"name":"IPSN '21: The 20th International Conference on Information Processing in Sensor Networks","sponsor":["IEEE-SPS Signal Processing Society","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Nashville TN USA","acronym":"IPSN '21"},"container-title":["Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412382.3458899","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412382.3458899","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412382.3458899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:01Z","timestamp":1750195501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412382.3458899"}},"subtitle":["An Online Randomness Distiller for Zero-Involvement Authentication"],"short-title":[],"issued":{"date-parts":[[2021,5,18]]},"references-count":40,"alternative-id":["10.1145\/3412382.3458899","10.1145\/3412382"],"URL":"https:\/\/doi.org\/10.1145\/3412382.3458899","relation":{},"subject":[],"published":{"date-parts":[[2021,5,18]]},"assertion":[{"value":"2021-05-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}