{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:15:20Z","timestamp":1725887720083},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_32","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"544-551","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["KBID: Kerberos Bracelet Identification (Short Paper)"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Carrigan","sequence":"first","affiliation":[]},{"given":"Paul","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Rushanan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Barth, A.T., Hanson, M.A., Powell, H.C., Unluer, D., Wilson, S.G., Lach, J.: Body-coupled communication for body sensor networks. In: Proceedings of the ICST 3rd International Conference on Body Area Networks (2008). http:\/\/dl.acm.org\/citation.cfm?id=1460257.1460273","DOI":"10.4108\/ICST.BODYNETS2008.2964"},{"key":"32_CR2","unstructured":"Chang, S., Hu, Y., Anderson, H., Fu, T., Huang, E.Y.L.: Body area network security: robust key establishment using human body channel. In: Proceedings of 3rd USENIX Workshop on Health Security and Privacy (HealthSec), August 2013. https:\/\/www.usenix.org\/conference\/healthsec12\/workshop-program\/presentation\/Chang"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDS and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 479\u2013490. ACM (2008)","DOI":"10.1145\/1455770.1455831"},{"issue":"9","key":"32_CR4","doi-asserted-by":"publisher","first-page":"11734","DOI":"10.3390\/s120911734","volume":"12","author":"C Gomez","year":"2012","unstructured":"Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of bluetooth low energy: an emerging low-power wireless technology. Sensors 12(9), 11734 (2012). http:\/\/www.mdpi.com\/1424-8220\/12\/9\/11734","journal-title":"Sensors"},{"issue":"5","key":"32_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(14)70088-8","volume":"2014","author":"A Goode","year":"2014","unstructured":"Goode, A.: Bring your own finger-how mobile is bringing biometrics to consumers. Biom. Technol. Today 2014(5), 5\u20139 (2014)","journal-title":"Biom. Technol. Today"},{"key":"32_CR6","unstructured":"Krzanich, B.: Intel developer forum san francisco opening keynote. Intel Corporation, Technical report (2015)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Mare, S., Markham, A., Cornelius, C., Peterson, R., Kotz, D.: Zebra: zero-effort bilateral recurring authentication. In: 2014 IEEE Symposium on Security and Privacy (SP), May 2014","DOI":"10.1109\/SP.2014.51"},{"key":"32_CR8","unstructured":"Ryan, M.: Bluetooth: with low energy comes low security. In: Proceedings of the 7th USENIX Conference on Offensive Technologies. USENIX Association (2013). http:\/\/dl.acm.org\/citation.cfm?id=2534748.2534754"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. (2004). http:\/\/dx.doi.org\/10.1109\/MSP.2004.81","DOI":"10.1109\/MSP.2004.81"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:48:32Z","timestamp":1712076512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}