{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:17:33Z","timestamp":1756383453870,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Research Council of Norway"},{"name":"Hessian Ministry of Higher Education, Research, Science and the Arts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,24]]},"DOI":"10.1145\/3458864.3467883","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T16:13:50Z","timestamp":1624378430000},"page":"440-452","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["FastZIP"],"prefix":"10.1145","author":[{"given":"Mikhail","family":"Fomichev","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Julia","family":"Hesse","sequence":"additional","affiliation":[{"name":"IBM Research Europe - Zurich"}]},{"given":"Lars","family":"Almon","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Timm","family":"Lippert","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt"}]}],"member":"320","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"72","volume-title":"Encrypted key exchange: password-based protocols secure against dictionary attacks. In &lt;u&gt;Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy&lt;\/u&gt;","author":"Bellovin S. M.","year":"1992","unstructured":"S. M. Bellovin and M. Merritt . Encrypted key exchange: password-based protocols secure against dictionary attacks. In &lt;u&gt;Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy&lt;\/u&gt; , pages 72 -- 84 , 1992 . S. M. Bellovin and M. Merritt. Encrypted key exchange: password-based protocols secure against dictionary attacks. In &lt;u&gt;Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy&lt;\/u&gt;, pages 72--84, 1992."},{"volume-title":"Cryptographic Key Length Recommendation","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"BlueKrypt. Cryptographic Key Length Recommendation , 2020 . https:\/\/www.keylength.com\/en\/4\/. BlueKrypt. Cryptographic Key Length Recommendation, 2020. https:\/\/www.keylength.com\/en\/4\/."},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"697","volume":"19","author":"Br\u00fcsch A.","year":"2019","unstructured":"A. Br\u00fcsch , N. Nguyen , D. Sch\u00fcrmann , S. Sigg , and L. Wolf . Security properties of gait for mobile device pairing. &lt;u&gt;IEEE Transactions on Mobile Computing&lt;\/u&gt; , 19 ( 3 ): 697 -- 710 , 2019 . A. Br\u00fcsch, N. Nguyen, D. Sch\u00fcrmann, S. Sigg, and L. Wolf. Security properties of gait for mobile device pairing. &lt;u&gt;IEEE Transactions on Mobile Computing&lt;\/u&gt;, 19(3):697--710, 2019.","journal-title":"Security properties of gait for mobile device pairing. &lt;u&gt;IEEE Transactions on Mobile Computing&lt;\/u&gt;"},{"key":"e_1_3_2_1_4_1","volume-title":"&lt;u&gt;The essential physics of medical imaging.&lt;\/u&gt","author":"Bushberg J. T.","year":"2011","unstructured":"J. T. Bushberg and J. M. Boone . &lt;u&gt;The essential physics of medical imaging.&lt;\/u&gt ; Lippincott Williams & Wilkins , 2011 . J. T. Bushberg and J. M. Boone. &lt;u&gt;The essential physics of medical imaging.&lt;\/u&gt; Lippincott Williams & Wilkins, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. &lt;u&gt;Sensors&lt;\/u&gt;, 19(9):2033","author":"Camara C.","year":"2019","unstructured":"C. Camara , H. Mart\u00edn , P. Peris-Lopez , and M. Aldalaien . Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. &lt;u&gt;Sensors&lt;\/u&gt;, 19(9):2033 , 2019 . C. Camara, H. Mart\u00edn, P. Peris-Lopez, and M. Aldalaien. Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. &lt;u&gt;Sensors&lt;\/u&gt;, 19(9):2033, 2019."},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"8","volume":"1","author":"Chen K.-Y.","year":"2017","unstructured":"K.-Y. Chen , R. C. Shah , J. Huang , and L. Nachman . Mago: Mode of Transport Inference Using the Hall-Effect Magnetic Sensor and Accelerometer. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt; , 1 ( 2 ): 8 , 2017 . K.-Y. Chen, R. C. Shah, J. Huang, and L. Nachman. Mago: Mode of Transport Inference Using the Hall-Effect Magnetic Sensor and Accelerometer. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;, 1(2):8, 2017.","journal-title":"&lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;"},{"key":"e_1_3_2_1_7_1","volume-title":"Who killed my parked car? &lt;u&gt;arXiv preprint arXiv:1801.07741&lt;\/u&gt;","author":"Cho K.-T.","year":"2018","unstructured":"K.-T. Cho , Y. Kim , and K. G. Shin . Who killed my parked car? &lt;u&gt;arXiv preprint arXiv:1801.07741&lt;\/u&gt; , 2018 . K.-T. Cho, Y. Kim, and K. G. Shin. Who killed my parked car? &lt;u&gt;arXiv preprint arXiv:1801.07741&lt;\/u&gt;, 2018."},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"8","volume":"47","author":"Chong M. K.","year":"2014","unstructured":"M. K. Chong , R. Mayrhofer , and H. Gellersen . A survey of user interaction for spontaneous device association. &lt;u&gt;ACM Computing Surveys (CSUR)&lt;\/u&gt; , 47 ( 1 ): 8 , 2014 . M. K. Chong, R. Mayrhofer, and H. Gellersen. A survey of user interaction for spontaneous device association. &lt;u&gt;ACM Computing Surveys (CSUR)&lt;\/u&gt;, 47(1):8, 2014.","journal-title":"&lt;u&gt;ACM Computing Surveys (CSUR)&lt;\/u&gt;"},{"key":"e_1_3_2_1_9_1","volume-title":"Newsflash: Car cyber-security still sucks","author":"Claburn T.","year":"2018","unstructured":"T. Claburn . Newsflash: Car cyber-security still sucks , 2018 . https:\/\/www.theregister.co.uk\/2018\/01\/26\/car_hacking_wireless\/. T. Claburn. Newsflash: Car cyber-security still sucks, 2018. https:\/\/www.theregister.co.uk\/2018\/01\/26\/car_hacking_wireless\/."},{"key":"e_1_3_2_1_10_1","first-page":"393","volume-title":"Fuzzy password-authenticated key exchange. In &lt;u&gt;Annual International Conference on the Theory and Applications of Cryptographic Techniques&lt;\/u&gt;","author":"Dupont P.-A.","year":"2018","unstructured":"P.-A. Dupont , J. Hesse , D. Pointcheval , L. Reyzin , and S. Yakoubov . Fuzzy password-authenticated key exchange. In &lt;u&gt;Annual International Conference on the Theory and Applications of Cryptographic Techniques&lt;\/u&gt; , pages 393 -- 424 . Springer , 2018 . P.-A. Dupont, J. Hesse, D. Pointcheval, L. Reyzin, and S. Yakoubov. Fuzzy password-authenticated key exchange. In &lt;u&gt;Annual International Conference on the Theory and Applications of Cryptographic Techniques&lt;\/u&gt;, pages 393--424. Springer, 2018."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748278"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4777836"},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"10","volume":"3","author":"Fomichev M.","year":"2019","unstructured":"M. Fomichev , M. Maass , L. Almon , A. Molina , and M. Hollick . Perils of Zero-Interaction Security in the Internet of Things. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt; , 3 ( 1 ): 10 , 2019 . M. Fomichev, M. Maass, L. Almon, A. Molina, and M. Hollick. Perils of Zero-Interaction Security in the Internet of Things. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;, 3(1):10, 2019.","journal-title":"&lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;"},{"key":"e_1_3_2_1_14_1","volume-title":"Zero-interaction security---towards sound experimental validation. &lt;u&gt;GetMobile: Mobile Computing and Communications&lt;\/u&gt;, 23(2):16--21","author":"Fomichev M.","year":"2019","unstructured":"M. Fomichev , M. Maass , and M. Hollick . Zero-interaction security---towards sound experimental validation. &lt;u&gt;GetMobile: Mobile Computing and Communications&lt;\/u&gt;, 23(2):16--21 , 2019 . M. Fomichev, M. Maass, and M. Hollick. Zero-interaction security---towards sound experimental validation. &lt;u&gt;GetMobile: Mobile Computing and Communications&lt;\/u&gt;, 23(2):16--21, 2019."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964151"},{"key":"e_1_3_2_1_16_1","first-page":"161","volume-title":"SAPHE: simple accelerometer based wireless pairing with heuristic trees. In &lt;u&gt;Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia&lt;\/u&gt;","author":"Groza B.","year":"2012","unstructured":"B. Groza and R. Mayrhofer . SAPHE: simple accelerometer based wireless pairing with heuristic trees. In &lt;u&gt;Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia&lt;\/u&gt; , pages 161 -- 168 . ACM , 2012 . B. Groza and R. Mayrhofer. SAPHE: simple accelerometer based wireless pairing with heuristic trees. In &lt;u&gt;Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia&lt;\/u&gt;, pages 161--168. ACM, 2012."},{"key":"e_1_3_2_1_17_1","first-page":"836","volume-title":"Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In &lt;u&gt;2018 IEEE Symposium on Security and Privacy (SP)&lt;\/u&gt;","author":"Han J.","year":"2018","unstructured":"J. Han , A. J. Chung , M. K. Sinha , M. Harishankar , S. Pan , H. Y. Noh , P. Zhang , and P. Tague . Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In &lt;u&gt;2018 IEEE Symposium on Security and Privacy (SP)&lt;\/u&gt; , pages 836 -- 852 . IEEE , 2018 . J. Han, A. J. Chung, M. K. Sinha, M. Harishankar, S. Pan, H. Y. Noh, P. Zhang, and P. Tague. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In &lt;u&gt;2018 IEEE Symposium on Security and Privacy (SP)&lt;\/u&gt;, pages 836--852. IEEE, 2018."},{"key":"e_1_3_2_1_18_1","volume-title":"ACM","author":"Han J.","year":"2017","unstructured":"J. Han , M. Harishankar , X. Wang , A. J. Chung , and P. Tague . Convoy: Physical context verification for vehicle platoon admission. In &lt;u&gt;Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications&lt;\/u&gt;, pages 73--78 . ACM , 2017 . J. Han, M. Harishankar, X. Wang, A. J. Chung, and P. Tague. Convoy: Physical context verification for vehicle platoon admission. In &lt;u&gt;Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications&lt;\/u&gt;, pages 73--78. ACM, 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Connected Cars: Improve Your Driving Experience with the Internet of Things (IoT)","author":"Blog Hertz","year":"2020","unstructured":"Hertz Blog . Connected Cars: Improve Your Driving Experience with the Internet of Things (IoT) , 2020 . https:\/\/www.hertz.com\/blog\/automotive\/improve-your-driving-experience-with-internet-of-things. Hertz Blog. Connected Cars: Improve Your Driving Experience with the Internet of Things (IoT), 2020. https:\/\/www.hertz.com\/blog\/automotive\/improve-your-driving-experience-with-internet-of-things."},{"volume-title":"Smart Car Statistics - The Increasingly Digital Experience of the Connected Vehicle","year":"2018","key":"e_1_3_2_1_20_1","unstructured":"Ironpaper. Smart Car Statistics - The Increasingly Digital Experience of the Connected Vehicle , 2018 . https:\/\/www.ironpaper.com\/webintel\/articles\/smart-car-statistics-the-increasingly-digital-experience-of-the-connected-vehicle\/. Ironpaper. Smart Car Statistics - The Increasingly Digital Experience of the Connected Vehicle, 2018. https:\/\/www.ironpaper.com\/webintel\/articles\/smart-car-statistics-the-increasingly-digital-experience-of-the-connected-vehicle\/."},{"key":"e_1_3_2_1_21_1","volume-title":"A fuzzy vault scheme. &lt;u&gt;Designs, Codes and Cryptography&lt;\/u&gt;, 38(2):237--257","author":"Juels A.","year":"2006","unstructured":"A. Juels and M. Sudan . A fuzzy vault scheme. &lt;u&gt;Designs, Codes and Cryptography&lt;\/u&gt;, 38(2):237--257 , 2006 . A. Juels and M. Sudan. A fuzzy vault scheme. &lt;u&gt;Designs, Codes and Cryptography&lt;\/u&gt;, 38(2):237--257, 2006."},{"key":"e_1_3_2_1_22_1","first-page":"28","volume-title":"A fuzzy commitment scheme. In &lt;u&gt;Proceedings of the 6th ACM conference on Computer and communications security&lt;\/u&gt;","author":"Juels A.","year":"1999","unstructured":"A. Juels and M. Wattenberg . A fuzzy commitment scheme. In &lt;u&gt;Proceedings of the 6th ACM conference on Computer and communications security&lt;\/u&gt; , pages 28 -- 36 , 1999 . A. Juels and M. Wattenberg. A fuzzy commitment scheme. In &lt;u&gt;Proceedings of the 6th ACM conference on Computer and communications security&lt;\/u&gt;, pages 28--36, 1999."},{"key":"e_1_3_2_1_23_1","first-page":"483","volume-title":"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In &lt;u&gt;USENIX Security Symposium&lt;\/u&gt;","author":"Karapanos N.","year":"2015","unstructured":"N. Karapanos , C. Marforio , C. Soriente , and S. Capkun . Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In &lt;u&gt;USENIX Security Symposium&lt;\/u&gt; , pages 483 -- 498 , 2015 . N. Karapanos, C. Marforio, C. Soriente, and S. Capkun. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In &lt;u&gt;USENIX Security Symposium&lt;\/u&gt;, pages 483--498, 2015."},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"Secure and Safe In-Vehicle Device Pairing Using Accelerometer Sensor. In &lt;u&gt;2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)&lt;\/u&gt;","author":"Kim Y. S.","year":"2019","unstructured":"Y. S. Kim . Secure and Safe In-Vehicle Device Pairing Using Accelerometer Sensor. In &lt;u&gt;2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)&lt;\/u&gt; , pages 1 -- 2 . IEEE , 2019 . Y. S. Kim. Secure and Safe In-Vehicle Device Pairing Using Accelerometer Sensor. In &lt;u&gt;2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)&lt;\/u&gt;, pages 1--2. IEEE, 2019."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2748182"},{"issue":"3","key":"e_1_3_2_1_26_1","first-page":"93","volume":"3","author":"Lee K.","year":"2019","unstructured":"K. Lee , N. Klingensmith , S. Banerjee , and Y. Kim . VoltKey: Continuous Secret Key Generation Based on Power Line Noise for Zero-Involvement Pairing and Authentication. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt; , 3 ( 3 ): 93 , 2019 . K. Lee, N. Klingensmith, S. Banerjee, and Y. Kim. VoltKey: Continuous Secret Key Generation Based on Power Line Noise for Zero-Involvement Pairing and Authentication. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;, 3(3):93, 2019.","journal-title":"&lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;"},{"key":"e_1_3_2_1_27_1","first-page":"265","volume-title":"H2B: heartbeat-based secret key generation using piezo vibration sensors. In &lt;u&gt;Proceedings of the 18th International Conference on Information Processing in Sensor Networks&lt;\/u&gt;","author":"Lin Q.","year":"2019","unstructured":"Q. Lin , W. Xu , J. Liu , A. Khamis , W. Hu , M. Hassan , and A. Seneviratne . H2B: heartbeat-based secret key generation using piezo vibration sensors. In &lt;u&gt;Proceedings of the 18th International Conference on Information Processing in Sensor Networks&lt;\/u&gt; , pages 265 -- 276 . ACM , 2019 . Q. Lin, W. Xu, J. Liu, A. Khamis, W. Hu, M. Hassan, and A. Seneviratne. H2B: heartbeat-based secret key generation using piezo vibration sensors. In &lt;u&gt;Proceedings of the 18th International Conference on Information Processing in Sensor Networks&lt;\/u&gt;, pages 265--276. ACM, 2019."},{"key":"e_1_3_2_1_28_1","volume-title":"ACM","author":"Miettinen M.","year":"2014","unstructured":"M. Miettinen , N. Asokan , T. D. Nguyen , A.-R. Sadeghi , and M. Sobhani . Context-based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. In &lt;u&gt;ACM Conference on Computer and Communications Security (CCS)&lt;\/u&gt;, pages 880--891 . ACM , 2014 . M. Miettinen, N. Asokan, T. D. Nguyen, A.-R. Sadeghi, and M. Sobhani. Context-based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. In &lt;u&gt;ACM Conference on Computer and Communications Security (CCS)&lt;\/u&gt;, pages 880--891. ACM, 2014."},{"key":"e_1_3_2_1_29_1","first-page":"1","volume-title":"Revisiting context-based authentication in IoT. In &lt;u&gt;Proceedings of the 55th Annual Design Automation Conference&lt;\/u&gt;","author":"Miettinen M.","year":"2018","unstructured":"M. Miettinen , T. D. Nguyen , A.-R. Sadeghi , and N. Asokan . Revisiting context-based authentication in IoT. In &lt;u&gt;Proceedings of the 55th Annual Design Automation Conference&lt;\/u&gt; , pages 1 -- 6 , 2018 . M. Miettinen, T. D. Nguyen, A.-R. Sadeghi, and N. Asokan. Revisiting context-based authentication in IoT. In &lt;u&gt;Proceedings of the 55th Annual Design Automation Conference&lt;\/u&gt;, pages 1--6, 2018."},{"key":"e_1_3_2_1_30_1","volume-title":"Secure device pairing: A survey. &lt;u&gt","author":"Mirzadeh S.","year":"2014","unstructured":"S. Mirzadeh , H. Cruickshank , and R. Tafazolli . Secure device pairing: A survey. &lt;u&gt ; IEEE Communications Surveys & Tutorials &lt;\/u&gt;, 16(1):17--40, 2014 . S. Mirzadeh, H. Cruickshank, and R. Tafazolli. Secure device pairing: A survey. &lt;u&gt;IEEE Communications Surveys & Tutorials&lt;\/u&gt;, 16(1):17--40, 2014."},{"key":"e_1_3_2_1_31_1","unstructured":"National Institute of Standards and Technology. EntropyAssessment 2019. https:\/\/github.com\/usnistgov\/SP800-90B_EntropyAssessment.  National Institute of Standards and Technology. EntropyAssessment 2019. https:\/\/github.com\/usnistgov\/SP800-90B_EntropyAssessment."},{"key":"e_1_3_2_1_32_1","first-page":"19","volume-title":"Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. In &lt;u&gt;29th {USENIX} Security Symposium ({USENIX} Security 20)&lt;\/u&gt;","author":"Ruge J.","year":"2020","unstructured":"J. Ruge , J. Classen , F. Gringoli , and M. Hollick . Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. In &lt;u&gt;29th {USENIX} Security Symposium ({USENIX} Security 20)&lt;\/u&gt; , pages 19 -- 36 , 2020 . J. Ruge, J. Classen, F. Gringoli, and M. Hollick. Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. In &lt;u&gt;29th {USENIX} Security Symposium ({USENIX} Security 20)&lt;\/u&gt;, pages 19--36, 2020."},{"key":"e_1_3_2_1_33_1","volume-title":"Booz-allen and hamilton inc mclean va","author":"Rukhin A.","year":"2001","unstructured":"A. Rukhin , J. Soto , J. Nechvatal , M. Smid , and E. Barker . A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report , Booz-allen and hamilton inc mclean va , 2001 . A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Booz-allen and hamilton inc mclean va, 2001."},{"key":"e_1_3_2_1_34_1","volume-title":"ACM","author":"Sankaran K.","year":"2014","unstructured":"K. Sankaran , M. Zhu , X. F. Guo , A. L. Ananda , M. C. Chan , and L.-S. Peh . Using mobile phone barometer for low-power transportation context detection. In &lt;u&gt;Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems&lt;\/u&gt;, pages 191--205 . ACM , 2014 . K. Sankaran, M. Zhu, X. F. Guo, A. L. Ananda, M. C. Chan, and L.-S. Peh. Using mobile phone barometer for low-power transportation context detection. In &lt;u&gt;Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems&lt;\/u&gt;, pages 191--205. ACM, 2014."},{"key":"e_1_3_2_1_35_1","volume-title":"IoT Connected car 3: Seat and Volvo Customer Experience","author":"Sanz A.","year":"2016","unstructured":"A. Sanz . IoT Connected car 3: Seat and Volvo Customer Experience , 2016 . http:\/\/blogs.icemd.com\/blog-iot-and-digital-marketing\/iot-connected-car-seat-volvo-customer-experience\/. A. Sanz. IoT Connected car 3: Seat and Volvo Customer Experience, 2016. http:\/\/blogs.icemd.com\/blog-iot-and-digital-marketing\/iot-connected-car-seat-volvo-customer-experience\/."},{"key":"e_1_3_2_1_36_1","first-page":"190","volume-title":"BANDANA---Body area network device-to-device authentication using natural gAit. In &lt;u&gt;2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)&lt;\/u&gt;","author":"Sch\u00fcrmann D.","year":"2017","unstructured":"D. Sch\u00fcrmann , A. Br\u00fcsch , S. Sigg , and L. Wolf . BANDANA---Body area network device-to-device authentication using natural gAit. In &lt;u&gt;2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)&lt;\/u&gt; , pages 190 -- 196 . IEEE , 2017 . D. Sch\u00fcrmann, A. Br\u00fcsch, S. Sigg, and L. Wolf. BANDANA---Body area network device-to-device authentication using natural gAit. In &lt;u&gt;2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)&lt;\/u&gt;, pages 190--196. IEEE, 2017."},{"key":"e_1_3_2_1_37_1","first-page":"358","volume":"12","author":"Sch\u00fcrmann D.","year":"2013","unstructured":"D. Sch\u00fcrmann and S. Sigg . Secure Communication Based on Ambient Audio. &lt;u&gt;IEEE Transactions on mobile computing&lt;\/u&gt; , 12 : 358 -- 370 , 2013 . D. Sch\u00fcrmann and S. Sigg. Secure Communication Based on Ambient Audio. &lt;u&gt;IEEE Transactions on mobile computing&lt;\/u&gt;, 12:358--370, 2013.","journal-title":"Secure Communication Based on Ambient Audio. &lt;u&gt;IEEE Transactions on mobile computing&lt;\/u&gt;"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"A. Stisen H. Blunck S. Bhattacharya T. S. Prentow M. B. Kj\u00e6rgaard A. Dey T. Sonne and M. M. Jensen. Smart devices are different: Assessing and mitigatingmobile sensing heterogeneities for activity recognition. In &lt;u&gt;Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems&lt;\/u&gt; pages 127--140. ACM 2015.  A. Stisen H. Blunck S. Bhattacharya T. S. Prentow M. B. Kj\u00e6rgaard A. Dey T. Sonne and M. M. Jensen. Smart devices are different: Assessing and mitigatingmobile sensing heterogeneities for activity recognition. In &lt;u&gt;Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems&lt;\/u&gt; pages 127--140. ACM 2015.","DOI":"10.1145\/2809695.2809718"},{"key":"e_1_3_2_1_39_1","volume-title":"pyca\/cryptography","author":"The","year":"2020","unstructured":"The pyca\/cryptography team. pyca\/cryptography , 2020 . https:\/\/github.com\/pyca\/cryptography. The pyca\/cryptography team. pyca\/cryptography, 2020. https:\/\/github.com\/pyca\/cryptography."},{"key":"e_1_3_2_1_40_1","volume-title":"pickle --- Python object serialization","author":"Software Foundation The Python","year":"2020","unstructured":"The Python Software Foundation . pickle --- Python object serialization , 2020 . https:\/\/docs.python.org\/3\/library\/pickle.html?highlight=pickle. The Python Software Foundation. pickle --- Python object serialization, 2020. https:\/\/docs.python.org\/3\/library\/pickle.html?highlight=pickle."},{"key":"e_1_3_2_1_41_1","volume-title":"socket --- Low-level networking interface","author":"Software Foundation The Python","year":"2020","unstructured":"The Python Software Foundation . socket --- Low-level networking interface , 2020 . https:\/\/docs.python.org\/3\/library\/socket.html?highlight=socket. The Python Software Foundation. socket --- Low-level networking interface, 2020. https:\/\/docs.python.org\/3\/library\/socket.html?highlight=socket."},{"key":"e_1_3_2_1_42_1","volume-title":"time --- Time access and conversions","author":"Software Foundation The Python","year":"2020","unstructured":"The Python Software Foundation . time --- Time access and conversions , 2020 . https:\/\/docs.python.org\/3\/library\/time.html#module-time. The Python Software Foundation. time --- Time access and conversions, 2020. https:\/\/docs.python.org\/3\/library\/time.html#module-time."},{"key":"e_1_3_2_1_43_1","unstructured":"S. A. Trikutam. Driving the Connected Car Revolution 2019. https:\/\/www.cypress.com\/blog\/corporate\/driving-connected-car-revolution.  S. A. Trikutam. Driving the Connected Car Revolution 2019. https:\/\/www.cypress.com\/blog\/corporate\/driving-connected-car-revolution."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90B"},{"key":"e_1_3_2_1_45_1","first-page":"199","volume-title":"Get in line: Ongoing co-presence verification of a vehicle formation based on driving trajectories. In &lt;u&gt;2018 IEEE European Symposium on Security and Privacy (EuroS&P)&lt;\/u&gt;","author":"Vaas C.","year":"2018","unstructured":"C. Vaas , M. Juuti , N. Asokan , and I. Martinovic . Get in line: Ongoing co-presence verification of a vehicle formation based on driving trajectories. In &lt;u&gt;2018 IEEE European Symposium on Security and Privacy (EuroS&P)&lt;\/u&gt; , pages 199 -- 213 . IEEE , 2018 . C. Vaas, M. Juuti, N. Asokan, and I. Martinovic. Get in line: Ongoing co-presence verification of a vehicle formation based on driving trajectories. In &lt;u&gt;2018 IEEE European Symposium on Security and Privacy (EuroS&P)&lt;\/u&gt;, pages 199--213. IEEE, 2018."},{"key":"e_1_3_2_1_46_1","volume-title":"Inertial Measurement Units I","author":"Wetzstein G.","year":"2019","unstructured":"G. Wetzstein . Inertial Measurement Units I , 2019 . https:\/\/stanford.edu\/class\/ee267\/lectures\/lecture9.pdf. G. Wetzstein. Inertial Measurement Units I, 2019. https:\/\/stanford.edu\/class\/ee267\/lectures\/lecture9.pdf."},{"issue":"1","key":"e_1_3_2_1_47_1","first-page":"1","volume":"4","author":"Wu Y.","year":"2020","unstructured":"Y. Wu , Q. Lin , H. Jia , M. Hassan , and W. Hu . Auto-Key: Using Autoencoder to Speed Up Gait-based Key Generation in Body Area Networks. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt; , 4 ( 1 ): 1 -- 23 , 2020 . Y. Wu, Q. Lin, H. Jia, M. Hassan, and W. Hu. Auto-Key: Using Autoencoder to Speed Up Gait-based Key Generation in Body Area Networks. &lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;, 4(1):1--23, 2020.","journal-title":"&lt;u&gt;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies&lt;\/u&gt;"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"W. Xu G. Revadigar C. Luo N. Bergmann and W. Hu. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. In &lt;u&gt;2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)&lt;\/u&gt; pages 1--12. IEEE 2016.  W. Xu G. Revadigar C. Luo N. Bergmann and W. Hu. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. In &lt;u&gt;2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)&lt;\/u&gt; pages 1--12. IEEE 2016.","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.013"},{"key":"e_1_3_2_1_50_1","first-page":"151","volume-title":"Analysis and improvement of entropy estimators in NIST SP 800-90B for non-IID entropy sources. &lt;u&gt;IACR Transactions on Symmetric Cryptology&lt;\/u&gt;","author":"Zhu S.","year":"2017","unstructured":"S. Zhu , Y. Ma , T. Chen , J. Lin , and J. Jing . Analysis and improvement of entropy estimators in NIST SP 800-90B for non-IID entropy sources. &lt;u&gt;IACR Transactions on Symmetric Cryptology&lt;\/u&gt; , pages 151 -- 168 , 2017 . S. Zhu, Y. Ma, T. Chen, J. Lin, and J. Jing. Analysis and improvement of entropy estimators in NIST SP 800-90B for non-IID entropy sources. &lt;u&gt;IACR Transactions on Symmetric Cryptology&lt;\/u&gt;, pages 151--168, 2017."}],"event":{"name":"MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Virtual Event Wisconsin","acronym":"MobiSys '21"},"container-title":["Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458864.3467883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458864.3467883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:55Z","timestamp":1750195495000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458864.3467883"}},"subtitle":["faster and more secure zero-interaction pairing"],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"references-count":50,"alternative-id":["10.1145\/3458864.3467883","10.1145\/3458864"],"URL":"https:\/\/doi.org\/10.1145\/3458864.3467883","relation":{},"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"2021-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}