{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:44:43Z","timestamp":1742384683932},"reference-count":38,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Technical Report"],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1016\/j.istr.2008.10.005","type":"journal-article","created":{"date-parts":[[2008,10,18]],"date-time":"2008-10-18T05:02:53Z","timestamp":1224306173000},"page":"136-150","source":"Crossref","is-referenced-by-count":9,"title":["Spontaneous mobile device authentication based on sensor data"],"prefix":"10.1016","volume":"13","author":[{"given":"Rene","family":"Mayrhofer","sequence":"first","affiliation":[]},{"given":"Hans","family":"Gellersen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.istr.2008.10.005_bib1","series-title":"Proceedings of the 13th USENIX security symposium","first-page":"207","article-title":"Network-in-a-box: how to set up a secure wireless network in under a minute","author":"Balfanz","year":"2004"},{"key":"10.1016\/j.istr.2008.10.005_bib2","series-title":"Proceedings of IOLTS: IEEE online testing symposium","first-page":"118","article-title":"Side-channel issues for designing secure hardware implementations","author":"Batina","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib3","series-title":"Proceedings of UbiComp 2007: ubiquitous computing","first-page":"304","article-title":"Key generation based on acceleration data of shaking processes","volume":"vol. 4717","author":"Bichler","year":"2007"},{"key":"10.1016\/j.istr.2008.10.005_bib4","first-page":"467","article-title":"Key agreement in peer-to-peer wireless networks","volume":"94","author":"\u010cagalj","year":"2006","journal-title":"IEEE (Special Issue on Cryptography and Security)"},{"issue":"6","key":"10.1016\/j.istr.2008.10.005_bib5","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.istr.2008.10.005_bib6","doi-asserted-by":"crossref","unstructured":"Eronen P, Tschofenig H. RFC4279: Pre-shared key ciphersuites for transport layer security (TLS); December 2005.","DOI":"10.17487\/rfc4279"},{"key":"10.1016\/j.istr.2008.10.005_bib7","series-title":"Practical cryptography","author":"Ferguson","year":"2003"},{"issue":"1","key":"10.1016\/j.istr.2008.10.005_bib8","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"Gehrmann","year":"2004","journal-title":"RSA Cryptobytes"},{"key":"10.1016\/j.istr.2008.10.005_bib9","series-title":"Proceedings of ICDCS 2006","first-page":"10","article-title":"Loud and clear: human verifiable authentication based on audio","author":"Goodrich","year":"2006"},{"key":"10.1016\/j.istr.2008.10.005_bib10","unstructured":"Dominique Guinard, Sara Streng, Hans Gellersen. Relategateways: a user interface for spontaneous mobile interaction with pervasive services. In: CHI 2007 workshop on mobile spatial interaction; 2007."},{"key":"10.1016\/j.istr.2008.10.005_bib11","series-title":"Proceedings of MobiSys 2005","first-page":"177","article-title":"A relative positioning system for co-located mobile devices","author":"Hazas","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib12","series-title":"Proceedings of eighth international conference on financial cryptography","first-page":"212","article-title":"The emphemeral pairing problem","author":"Hoepman","year":"2004"},{"key":"10.1016\/j.istr.2008.10.005_bib13","series-title":"Proceedings of UbiComp 2001","first-page":"116","article-title":"Smart-its friends: a technique for users to easily establish connections between smart artefacts","author":"Holmquist","year":"2001"},{"key":"10.1016\/j.istr.2008.10.005_bib14","series-title":"Proceedings of Soc-EUSAI 2005, ACM international conference proceeding series","first-page":"159","article-title":"Analyzing features for activity recognition","author":"Huynh","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib15","series-title":"Proceedings of UbiComp 2003","first-page":"124","article-title":"Secure spontaneous device association","author":"Kindberg","year":"2003"},{"key":"10.1016\/j.istr.2008.10.005_bib16","series-title":"Proceedings of ISC'03","first-page":"44","article-title":"Validating and securing spontaneous associations between wireless devices","author":"Kindberg","year":"2003"},{"key":"10.1016\/j.istr.2008.10.005_bib17","series-title":"Technical report HPL-2005-40","article-title":"Evidently secure device associations","author":"Kindberg","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib18","unstructured":"Darko Kirovski, Mike Sinclair, David Wilson. The Martini synch. Technical report MSR-TR-2007-123, Microsoft Research; September 2007."},{"key":"10.1016\/j.istr.2008.10.005_bib19","series-title":"Proceedings of UIST 2005","first-page":"93","article-title":"Sensing and visualizing spatial relations of mobile devices","author":"Kortuem","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib20","doi-asserted-by":"crossref","unstructured":"Krawczyk H, Bellare M, Canetti R. RFC2104:HMAC: keyed-hashing for message authentication; February 1997.","DOI":"10.17487\/rfc2104"},{"key":"10.1016\/j.istr.2008.10.005_bib21","series-title":"Proceedings of Pervasive 2004","first-page":"33","article-title":"\u201cAre you with me? \u201d \u2013 using accelerometers to determine if two devices are carried by the same person","author":"Lester","year":"2004"},{"key":"10.1016\/j.istr.2008.10.005_bib22","series-title":"Proceedings of TwUC 2006: first international workshop on trustworthy ubiquitous computing","first-page":"449","article-title":"A context authentication proxy for IPSec using spatial reference","author":"Mayrhofer","year":"2006"},{"key":"10.1016\/j.istr.2008.10.005_bib23","series-title":"Proceedings of ESAS 2007: fourth European workshop on security and privacy in ad hoc and sensor networks","first-page":"1","article-title":"The candidate key protocol for generating secret shared keys from similar sensor data streams","volume":"vol. 4572","author":"Mayrhofer","year":"2007"},{"key":"10.1016\/j.istr.2008.10.005_bib24","series-title":"Proceedings of IPDPS 2007: 21st IEEE international parallel and distributed processing symposium","first-page":"321","article-title":"On the security of ultrasound as out-of-band channel","author":"Mayrhofer","year":"2007"},{"key":"10.1016\/j.istr.2008.10.005_bib25","series-title":"Proceedings of Pervasive 2007: fifth international conference on Pervasive Computing","first-page":"144","article-title":"Shake well before use: authentication based on accelerometer data","volume":"vol. 4480","author":"Mayrhofer","year":"2007"},{"key":"10.1016\/j.istr.2008.10.005_bib26","series-title":"Technical report COMP-002-2006","article-title":"An authentication protocol using ultrasonic ranging","author":"Mayrhofer","year":"2006"},{"key":"10.1016\/j.istr.2008.10.005_bib27","series-title":"Proceedings of UbiComp 2007: ninth international conference on ubiquitous computing","first-page":"199","article-title":"Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction","volume":"vol. 4717","author":"Mayrhofer","year":"2007"},{"key":"10.1016\/j.istr.2008.10.005_bib28","article-title":"Securing passive objects in mobile ad-hoc peer-to-peer networks","volume":"vol. 85.3","author":"Mayrhofer","year":"2003"},{"key":"10.1016\/j.istr.2008.10.005_bib29","series-title":"Proceedings of ARES 2007: second international conference on availability, reliability and security","first-page":"1143","article-title":"A human-verifiable authentication protocol using visible laser light","author":"Mayrhofer","year":"2007"},{"key":"10.1016\/j.istr.2008.10.005_bib30","series-title":"Proceedings of IEEE symposium on security and privacy","first-page":"110","article-title":"Seeing-is-believing: using camera phones for human-verifiable authentication","author":"McCune","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib31","series-title":"Proceedings of Pervasive 2006","first-page":"202","article-title":"LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment","author":"Nicholson","year":"2006"},{"key":"10.1016\/j.istr.2008.10.005_bib32","series-title":"Proceedings of UbiComp 2003","first-page":"200","article-title":"A 2-way laser-assisted selection scheme for handhelds in a physical environment","author":"Patel","year":"2003"},{"key":"10.1016\/j.istr.2008.10.005_bib33","unstructured":"Ringwald M. Spontaneous interaction with everyday devices using a PDA. In: Proceedings of workshop on supporting spontaneous interaction in ubiquitous computing settings; September 2002."},{"issue":"4","key":"10.1016\/j.istr.2008.10.005_bib34","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/358027.358053","article-title":"How to expose an eavesdropper","volume":"27","author":"Rivest","year":"1984","journal-title":"Commununications of ACM"},{"key":"10.1016\/j.istr.2008.10.005_bib35","series-title":"Proceedings of MobiSys 2005","first-page":"39","article-title":"Cracking the Bluetooth PIN","author":"Shaked","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib36","series-title":"Proceedings of seventh international workshop on security protocols","first-page":"172","article-title":"The resurrecting duckling: security issues for ad-hoc wireless networks","author":"Stajano","year":"1999"},{"key":"10.1016\/j.istr.2008.10.005_bib37","series-title":"Proceedings of CRYPTO 2005","article-title":"Secure communications over insecure channels based on short authenticated strings","author":"Vaudenay","year":"2005"},{"key":"10.1016\/j.istr.2008.10.005_bib38","series-title":"Proceedings of security protocols workshop 2005","article-title":"Multi-channel protocols","author":"Wong","year":"2006"}],"container-title":["Information Security Technical Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412708000447?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412708000447?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T14:15:44Z","timestamp":1573222544000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1363412708000447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["S1363412708000447"],"URL":"https:\/\/doi.org\/10.1016\/j.istr.2008.10.005","relation":{},"ISSN":["1363-4127"],"issn-type":[{"value":"1363-4127","type":"print"}],"subject":[],"published":{"date-parts":[[2008,8]]}}}