{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:23:26Z","timestamp":1729617806005,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/aina.2012.51","type":"proceedings-article","created":{"date-parts":[[2012,4,25]],"date-time":"2012-04-25T16:15:04Z","timestamp":1335370504000},"page":"526-533","source":"Crossref","is-referenced-by-count":12,"title":["Clock Skew Based Client Device Identification in Cloud Environments"],"prefix":"10.1109","author":[{"given":"Ding-Jie","family":"Huang","sequence":"first","affiliation":[]},{"given":"Kai-Ting","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chien-Chun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Wei-Chung","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Tien-Ruey","family":"Hsiang","sequence":"additional","affiliation":[]},{"given":"Yuh-Jye","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"11","article-title":"Device identification via analog signal fingerprinting: A matched filter approach","author":"gerdes","year":"2006","journal-title":"Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS '06)"},{"key":"12","first-page":"331","author":"bonne rasmussen","year":"2007","journal-title":"Implications of Radio Fingerprinting on the Security of Sensor Networks"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277865"},{"key":"1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","article-title":"How unique is your web browser?","volume":"6205","author":"eckersley","year":"2010","journal-title":"Privacy Enhancing Technologies"},{"key":"10","article-title":"Detection of transient in radio frequency fingerprinting using signal phase","author":"hall","year":"2003","journal-title":"Proceedings of IASTED International Conference on Wireless and Optical Communications (WOC '03)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.363"},{"key":"6","first-page":"211","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"journal-title":"Top Threats to Cloud Computing V1 0","year":"0","key":"9"},{"key":"8","first-page":"1","article-title":"toward clock skew based wireless sensor node services","author":"uddin","year":"2010","journal-title":"2010 The 5th Annual ICST Wireless Internet Conference (WICON) WICON"}],"event":{"name":"2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA)","start":{"date-parts":[[2012,3,26]]},"location":"Fukuoka, Japan","end":{"date-parts":[[2012,3,29]]}},"container-title":["2012 IEEE 26th International Conference on Advanced Information Networking and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6184368\/6184848\/06184915.pdf?arnumber=6184915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T13:52:27Z","timestamp":1497966747000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6184915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/aina.2012.51","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}