{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:05:30Z","timestamp":1764842730550,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T00:00:00Z","timestamp":1662854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chow Sang Sang Holdings International Limited","award":["9229062"],"award-info":[{"award-number":["9229062"]}]},{"name":"NSFC","award":["62101471"],"award-info":[{"award-number":["62101471"]}]},{"name":"Changsha International and Regional Science and Technology Cooperation Program","award":["kh2201023"],"award-info":[{"award-number":["kh2201023"]}]},{"name":"Research Grants Council (RGC) of Hong Kong","award":["21201420"],"award-info":[{"award-number":["21201420"]}]},{"name":"Shenzhen Science and Technology Innovation Committee","award":["2021Szvup126"],"award-info":[{"award-number":["2021Szvup126"]}]},{"name":"NSF of Shandong Province","award":["ZR2021LZH010"],"award-info":[{"award-number":["ZR2021LZH010"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,11]]},"DOI":"10.1145\/3544793.3560413","type":"proceedings-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T20:03:23Z","timestamp":1682366603000},"page":"427-431","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["MobileKey: A Fast and Robust Key Generation System for Mobile Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5363-6067","authenticated-orcid":false,"given":"Keqi","family":"Song","sequence":"first","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5818-1989","authenticated-orcid":false,"given":"Zimeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Economic and Management, Tongji University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7867-6217","authenticated-orcid":false,"given":"Huanqi","family":"Yang","sequence":"additional","affiliation":[{"name":"Depertment of computer science, City University of Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0671-3020","authenticated-orcid":false,"given":"Tao","family":"Ni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9741-5912","authenticated-orcid":false,"given":"Weitao","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.71"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900023"},{"key":"e_1_3_2_1_3_1","volume-title":"Compressed sensing","author":"Donoho L","year":"2006","unstructured":"David\u00a0 L Donoho . 2006. Compressed sensing . IEEE Transactions on Information Theory ( 2006 ). David\u00a0L Donoho. 2006. Compressed sensing. IEEE Transactions on Information Theory (2006)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412382.3458256"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2896258"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349623.3355477"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134624"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310406"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_3_2_1_13_1","volume-title":"2012 Proceedings IEEE Infocom. IEEE, 927\u2013935","author":"Liu Hongbo","year":"2012","unstructured":"Hongbo Liu , Jie Yang , Yan Wang , and Yingying Chen . 2012 . Collaborative secret key extraction leveraging received signal strength in mobile wireless networks . In 2012 Proceedings IEEE Infocom. IEEE, 927\u2013935 . Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In 2012 Proceedings IEEE Infocom. IEEE, 927\u2013935."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000016"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_17_1","volume-title":"DLINK: Dual link based radio frequency fingerprinting for wearable devices.","author":"Revadigar Girish","year":"2015","unstructured":"Girish Revadigar , Chitra Javali , Wen Hu , and Sanjay Jha . 2015 . DLINK: Dual link based radio frequency fingerprinting for wearable devices. (2015), 329\u2013337. Girish Revadigar, Chitra Javali, Wen Hu, and Sanjay Jha. 2015. DLINK: Dual link based radio frequency fingerprinting for wearable devices. (2015), 329\u2013337."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210333"},{"key":"e_1_3_2_1_20_1","volume-title":"A survey of public-key cryptographic primitives in wireless sensor networks","author":"Shim Kyung-Ah","year":"2015","unstructured":"Kyung-Ah Shim . 2015. A survey of public-key cryptographic primitives in wireless sensor networks . IEEE Communications Surveys and Tutorials ( 2015 ). Kyung-Ah Shim. 2015. A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Communications Surveys and Tutorials (2015)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888553"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429740"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Kai Zeng Daniel Wu An Chan and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. (2010) 1\u20139.  Kai Zeng Daniel Wu An Chan and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. (2010) 1\u20139.","DOI":"10.1109\/INFCOM.2010.5462004"}],"event":{"name":"UbiComp\/ISWC '22: The 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Cambridge United Kingdom","acronym":"UbiComp\/ISWC '22"},"container-title":["Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544793.3560413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544793.3560413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:06Z","timestamp":1750186806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544793.3560413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,11]]},"references-count":23,"alternative-id":["10.1145\/3544793.3560413","10.1145\/3544793"],"URL":"https:\/\/doi.org\/10.1145\/3544793.3560413","relation":{},"subject":[],"published":{"date-parts":[[2022,9,11]]},"assertion":[{"value":"2023-04-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}