[
    {
        "key": "HRUZTQHK",
        "version": 32,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/HRUZTQHK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/HRUZTQHK",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/94791/items/SQDWK8FZ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "HRUZTQHK",
            "version": 32,
            "parentItem": "SQDWK8FZ",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Georgiev et al. - 2014 - Breaking and Fixing Origin-Based Access Control in.pdf",
            "accessDate": "2019-03-10T00:37:14Z",
            "url": "https://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Georgiev et al. - 2014 - Breaking and Fixing Origin-Based Access Control in.pdf",
            "md5": "22564deb3ec2145e4b0b07e9305e7885",
            "mtime": 1552178237000,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:37:14Z",
            "dateModified": "2019-03-10T00:37:17Z"
        }
    },
    {
        "key": "SQDWK8FZ",
        "version": 31,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/SQDWK8FZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/SQDWK8FZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Georgiev et al.",
            "parsedDate": "2014",
            "numChildren": 1
        },
        "data": {
            "key": "SQDWK8FZ",
            "version": 31,
            "itemType": "conferencePaper",
            "title": "Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Martin",
                    "lastName": "Georgiev"
                },
                {
                    "creatorType": "author",
                    "firstName": "Suman",
                    "lastName": "Jana"
                },
                {
                    "creatorType": "author",
                    "firstName": "Vitaly",
                    "lastName": "Shmatikov"
                }
            ],
            "abstractNote": "Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platformindependent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—ﬁle system, location, camera, contacts, etc.",
            "proceedingsTitle": "Proceedings 2014 Network and Distributed System Security Symposium",
            "conferenceName": "Network and Distributed System Security Symposium",
            "publisher": "Internet Society",
            "place": "San Diego, CA",
            "date": "2014",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.14722/ndss.2014.23323",
            "ISBN": "978-1-891562-35-8",
            "citationKey": "",
            "url": "https://www.ndss-symposium.org/ndss2014/programme/breaking-and-fixing-origin-based-access-control-hybrid-webmobile-application-frameworks/",
            "accessDate": "2019-03-10T00:37:17Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "Crossref",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:37:17Z",
            "dateModified": "2019-03-10T00:37:17Z"
        }
    },
    {
        "key": "YE4GPKCB",
        "version": 29,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/YE4GPKCB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/YE4GPKCB",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/94791/items/WGV66A85",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "YE4GPKCB",
            "version": 29,
            "parentItem": "WGV66A85",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Luo et al. - Attacks on WebView in the Android System.pdf",
            "accessDate": "2019-03-10T00:36:04Z",
            "url": "http://www.cis.syr.edu/~wedu/Research/paper/webview_acsac2011.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Luo et al. - Attacks on WebView in the Android System.pdf",
            "md5": "b78e7c2ceaef6cdb7b380c074ec726b1",
            "mtime": 1552178167000,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:36:04Z",
            "dateModified": "2019-03-10T00:36:08Z"
        }
    },
    {
        "key": "WGV66A85",
        "version": 28,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/WGV66A85",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/WGV66A85",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Luo et al.",
            "numChildren": 1
        },
        "data": {
            "key": "WGV66A85",
            "version": 28,
            "itemType": "journalArticle",
            "title": "Attacks on WebView in the Android System",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Tongbo",
                    "lastName": "Luo"
                },
                {
                    "creatorType": "author",
                    "firstName": "Hao",
                    "lastName": "Hao"
                },
                {
                    "creatorType": "author",
                    "firstName": "Wenliang",
                    "lastName": "Du"
                },
                {
                    "creatorType": "author",
                    "firstName": "Yifei",
                    "lastName": "Wang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Heng",
                    "lastName": "Yin"
                }
            ],
            "abstractNote": "WebView is an essential component in both Android and iOS platforms, enabling smartphone and tablet apps to embed a simple but powerful browser inside them. To achieve a better interaction between apps and their embedded “browsers”, WebView provides a number of APIs, allowing code in apps to invoke and be invoked by the JavaScript code within the web pages, intercept their events, and modify those events. Using these features, apps can become customized “browsers” for their intended web applications. Currently, in the Android market, 86 percent of the top 20 most downloaded apps in 10 diverse categories use WebView.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "10",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "Zotero",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:36:07Z",
            "dateModified": "2019-03-10T00:36:07Z"
        }
    },
    {
        "key": "5PJJE6EJ",
        "version": 26,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/5PJJE6EJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/5PJJE6EJ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/94791/items/QI38LTVV",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "5PJJE6EJ",
            "version": 26,
            "parentItem": "QI38LTVV",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Son et al. - 2016 - What Mobile Ads Know About Mobile Users.pdf",
            "accessDate": "2019-03-10T00:29:17Z",
            "url": "https://www.ftc.gov/system/files/documents/public_comments/2015/09/00006-97209.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Son et al. - 2016 - What Mobile Ads Know About Mobile Users.pdf",
            "md5": "ed597bc9ae2680907399d5eb94d8b16f",
            "mtime": 1552177759000,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:29:17Z",
            "dateModified": "2019-03-10T00:29:19Z"
        }
    },
    {
        "key": "QI38LTVV",
        "version": 25,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/QI38LTVV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/QI38LTVV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Son et al.",
            "parsedDate": "2016",
            "numChildren": 1
        },
        "data": {
            "key": "QI38LTVV",
            "version": 25,
            "itemType": "conferencePaper",
            "title": "What Mobile Ads Know About Mobile Users",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Sooel",
                    "lastName": "Son"
                },
                {
                    "creatorType": "author",
                    "firstName": "Daehyeok",
                    "lastName": "Kim"
                },
                {
                    "creatorType": "author",
                    "firstName": "Vitaly",
                    "lastName": "Shmatikov"
                }
            ],
            "abstractNote": "We analyze the software stack of popular mobile advertising libraries on Android and investigate how they protect the users of advertising-supported apps from malicious advertising. We ﬁnd that, by and large, Android advertising libraries properly separate the privileges of the ads from the host app by conﬁning ads to dedicated browser instances that correctly apply the same origin policy.",
            "proceedingsTitle": "Proceedings 2016 Network and Distributed System Security Symposium",
            "conferenceName": "Network and Distributed System Security Symposium",
            "publisher": "Internet Society",
            "place": "San Diego, CA",
            "date": "2016",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.14722/ndss.2016.23407",
            "ISBN": "978-1-891562-41-9",
            "citationKey": "",
            "url": "https://www.ndss-symposium.org/wp-content/uploads/sites/25/2017/09/what-mobile-ads-know-about-mobile-users.pdf",
            "accessDate": "2019-03-10T00:29:19Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "Crossref",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:29:19Z",
            "dateModified": "2019-03-10T00:29:19Z"
        }
    },
    {
        "key": "44AGW2N8",
        "version": 23,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/44AGW2N8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/44AGW2N8",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/94791/items/WB3XJIEL",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "44AGW2N8",
            "version": 23,
            "parentItem": "WB3XJIEL",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Demetriou et al. - 2016 - Free for All! Assessing User Data Exposure to Adve.pdf",
            "accessDate": "2019-03-10T00:25:04Z",
            "url": "http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/free-for-all-assessing-user-data-exposure-advertising-libraries-android.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Demetriou et al. - 2016 - Free for All! Assessing User Data Exposure to Adve.pdf",
            "md5": "902aa4f9cebe8adb9b0cc8a0a5da1cb0",
            "mtime": 1552177507000,
            "tags": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:25:04Z",
            "dateModified": "2019-03-10T00:25:07Z"
        }
    },
    {
        "key": "WB3XJIEL",
        "version": 22,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/WB3XJIEL",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/WB3XJIEL",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Demetriou et al.",
            "parsedDate": "2016",
            "numChildren": 1
        },
        "data": {
            "key": "WB3XJIEL",
            "version": 22,
            "itemType": "conferencePaper",
            "title": "Free for All! Assessing User Data Exposure to Advertising Libraries on Android",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Soteris",
                    "lastName": "Demetriou"
                },
                {
                    "creatorType": "author",
                    "firstName": "Whitney",
                    "lastName": "Merrill"
                },
                {
                    "creatorType": "author",
                    "firstName": "Wei",
                    "lastName": "Yang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Aston",
                    "lastName": "Zhang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Carl A.",
                    "lastName": "Gunter"
                }
            ],
            "abstractNote": "Many studies focused on detecting and measuring the security and privacy risks associated with the integration of advertising libraries in mobile apps. These studies consistently demonstrate the abuses of existing ad libraries. However, to fully assess the risks of an app that uses an advertising library, we need to take into account not only the current behaviors but all of the allowed behaviors that could result in the compromise of user data conﬁdentiality. Ad libraries on Android have potential for greater data collection through at least four major channels: using unprotected APIs to learn other apps’ information on the phone (e.g., app names); using protected APIs via permissions inherited from the host app to access sensitive information (e.g. Google and Facebook account information, geo locations); gaining access to ﬁles which the host app stores in its own protection domain; and observing user inputs into the host app.",
            "proceedingsTitle": "Proceedings 2016 Network and Distributed System Security Symposium",
            "conferenceName": "Network and Distributed System Security Symposium",
            "publisher": "Internet Society",
            "place": "San Diego, CA",
            "date": "2016",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.14722/ndss.2016.23082",
            "ISBN": "978-1-891562-41-9",
            "citationKey": "",
            "url": "https://www.ndss-symposium.org/wp-content/uploads/sites/25/2017/09/free-for-all-assessing-user-data-exposure-advertising-libraries-android.pdf",
            "accessDate": "2019-03-10T00:25:07Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "Crossref",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2019-03-10T00:25:07Z",
            "dateModified": "2019-03-10T00:25:07Z"
        }
    },
    {
        "key": "D9CCEVSD",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/D9CCEVSD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/D9CCEVSD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1154866,
                "username": "mihoelzl",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mihoelzl",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Wu",
            "parsedDate": "1998",
            "numChildren": 2
        },
        "data": {
            "key": "D9CCEVSD",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "The secure remote password protocol",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Thomas",
                    "lastName": "Wu"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium",
            "conferenceName": "",
            "publisher": "",
            "place": "",
            "date": "1998",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "97–111",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [],
            "collections": [
                "T28JVZSE"
            ],
            "relations": {},
            "dateAdded": "2013-10-18T09:15:14Z",
            "dateModified": "2017-05-11T15:24:46Z"
        }
    },
    {
        "key": "D8UZGRJ8",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/D8UZGRJ8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/D8UZGRJ8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Ben-Asher et al.",
            "parsedDate": "2011",
            "numChildren": 1
        },
        "data": {
            "key": "D8UZGRJ8",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "On the need for different security methods on mobile phones",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Noam",
                    "lastName": "Ben-Asher"
                },
                {
                    "creatorType": "author",
                    "firstName": "Niklas",
                    "lastName": "Kirschnick"
                },
                {
                    "creatorType": "author",
                    "firstName": "Hanul",
                    "lastName": "Sieger"
                },
                {
                    "creatorType": "author",
                    "firstName": "Joachim",
                    "lastName": "Meyer"
                },
                {
                    "creatorType": "author",
                    "firstName": "Asaf",
                    "lastName": "Ben-Oved"
                },
                {
                    "creatorType": "author",
                    "firstName": "Sebastian",
                    "lastName": "Möller"
                }
            ],
            "abstractNote": "Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.",
            "proceedingsTitle": "Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "465–473",
            "series": "MobileHCI '11",
            "seriesNumber": "",
            "DOI": "10.1145/2037373.2037442",
            "ISBN": "978-1-4503-0541-9",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/2037373.2037442",
            "accessDate": "2012-06-18T14:13:39Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0006",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "Authentication",
                    "type": 1
                },
                {
                    "tag": "authentication methods",
                    "type": 1
                },
                {
                    "tag": "data protection",
                    "type": 1
                },
                {
                    "tag": "graded security model",
                    "type": 1
                },
                {
                    "tag": "mobile phone security",
                    "type": 1
                },
                {
                    "tag": "survey",
                    "type": 1
                }
            ],
            "collections": [
                "3ZC86UEK",
                "VFBDGCAT"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:49:41Z",
            "dateModified": "2017-05-11T15:24:45Z"
        }
    },
    {
        "key": "CQSF993F",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/CQSF993F",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/CQSF993F",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1154866,
                "username": "mihoelzl",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mihoelzl",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Bellare et al.",
            "parsedDate": "2000",
            "numChildren": 2
        },
        "data": {
            "key": "CQSF993F",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Authenticated key exchange secure against dictionary attacks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Mihir",
                    "lastName": "Bellare"
                },
                {
                    "creatorType": "author",
                    "firstName": "David",
                    "lastName": "Pointcheval"
                },
                {
                    "creatorType": "author",
                    "firstName": "Phillip",
                    "lastName": "Rogaway"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Advances in Cryptology—Eurocrypt 2000",
            "conferenceName": "",
            "publisher": "",
            "place": "",
            "date": "2000",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "139–155",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/3-540-45539-6_11",
            "accessDate": "2013-10-16T09:14:10Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [],
            "collections": [
                "T28JVZSE"
            ],
            "relations": {},
            "dateAdded": "2013-10-18T09:15:14Z",
            "dateModified": "2017-05-11T15:24:44Z"
        }
    },
    {
        "key": "CP6BMAJT",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/CP6BMAJT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/CP6BMAJT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1154866,
                "username": "mihoelzl",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mihoelzl",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Muniyandi et al.",
            "parsedDate": "2011",
            "numChildren": 1
        },
        "data": {
            "key": "CP6BMAJT",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Password based remote authentication scheme using ECC for smart card",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Amutha Prabakar",
                    "lastName": "Muniyandi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Rajaram",
                    "lastName": "Ramasamy"
                },
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Indrani"
                }
            ],
            "abstractNote": "Remote user authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops. Providing user authentication for safe access of precious, private information, or personalized services, for every system is difficult User authentication is the primary line of defence for a handheld device that falls into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users. Remote authentication is the best solution for remote accessing in smart card environment. In this paper we propose a Password based authentication scheme using ECC for smart card environment, without maintaining the password table by the server. It provides high security at a reasonable computational cost. Furthermore it restricts most of the current attacking mechanisms. It is simple and can be adopted in any kind of lightweight devices.",
            "proceedingsTitle": "Proceedings of the 2011 International Conference on Communication, Computing &#38; Security",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "549–554",
            "series": "ICCCS '11",
            "seriesNumber": "",
            "DOI": "10.1145/1947940.1948054",
            "ISBN": "978-1-4503-0464-1",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1947940.1948054",
            "accessDate": "2013-10-15T11:50:40Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "Authentication",
                    "type": 1
                },
                {
                    "tag": "ECC",
                    "type": 1
                },
                {
                    "tag": "Wi-Fi devices",
                    "type": 1
                },
                {
                    "tag": "mobile devices",
                    "type": 1
                },
                {
                    "tag": "smartcard",
                    "type": 1
                }
            ],
            "collections": [
                "KFEF5KE8"
            ],
            "relations": {},
            "dateAdded": "2013-10-18T09:14:49Z",
            "dateModified": "2017-05-11T15:24:43Z"
        }
    },
    {
        "key": "CJCTXF96",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/CJCTXF96",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/CJCTXF96",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Mathur et al.",
            "parsedDate": "2011",
            "numChildren": 2
        },
        "data": {
            "key": "CJCTXF96",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "ProxiMate: proximity-based secure pairing using ambient wireless signals",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "S.",
                    "lastName": "Mathur"
                },
                {
                    "creatorType": "author",
                    "firstName": "R.",
                    "lastName": "Miller"
                },
                {
                    "creatorType": "author",
                    "firstName": "A.",
                    "lastName": "Varshavsky"
                },
                {
                    "creatorType": "author",
                    "firstName": "W.",
                    "lastName": "Trappe"
                },
                {
                    "creatorType": "author",
                    "firstName": "N.",
                    "lastName": "Mandayam"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Proceedings of the 9th international conference on Mobile systems, applications, and services",
            "conferenceName": "",
            "publisher": "",
            "place": "",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "211–224",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=2000016",
            "accessDate": "2012-06-18T14:09:52Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "ProxiMate",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [],
            "collections": [
                "MHWTTUNT",
                "R4KRXTD8"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:51:19Z",
            "dateModified": "2017-05-11T15:24:42Z"
        }
    },
    {
        "key": "AZ573TAJ",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/AZ573TAJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/AZ573TAJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Maiorana et al.",
            "parsedDate": "2011",
            "numChildren": 1
        },
        "data": {
            "key": "AZ573TAJ",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Keystroke dynamics authentication for mobile phones",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Emanuele",
                    "lastName": "Maiorana"
                },
                {
                    "creatorType": "author",
                    "firstName": "Patrizio",
                    "lastName": "Campisi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Noelia",
                    "lastName": "González-Carballo"
                },
                {
                    "creatorType": "author",
                    "firstName": "Alessandro",
                    "lastName": "Neri"
                }
            ],
            "abstractNote": "In this paper we discuss the feasibility of employing keystroke dynamics to perform user verification on mobile phones. Specifically, after having introduced a new statistical classifier, we analyze the discriminative capabilities of the features extracted from the acquired patterns, in order to determine which ones guarantee the best authentication performances. The effectiveness of using template selection techniques for keystroke verification is also investigated. The obtained experimental results indicate that the proposed method can be effectively employed to authenticate mobile phones users, even in operational contexts where the number of enrollment acquisition is kept low.",
            "proceedingsTitle": "Proceedings of the 2011 ACM Symposium on Applied Computing",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "21–26",
            "series": "SAC '11",
            "seriesNumber": "",
            "DOI": "10.1145/1982185.1982190",
            "ISBN": "978-1-4503-0113-8",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1982185.1982190",
            "accessDate": "2012-06-18T13:29:52Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0003",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "biometrics",
                    "type": 1
                },
                {
                    "tag": "keystroke dynamics",
                    "type": 1
                },
                {
                    "tag": "mobile phones",
                    "type": 1
                },
                {
                    "tag": "template selection",
                    "type": 1
                }
            ],
            "collections": [
                "R4KRXTD8"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:51:19Z",
            "dateModified": "2017-05-11T15:24:41Z"
        }
    },
    {
        "key": "AM4CPT4J",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/AM4CPT4J",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/AM4CPT4J",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Raza et al.",
            "parsedDate": "2012-01-18",
            "numChildren": 2
        },
        "data": {
            "key": "AM4CPT4J",
            "version": 20,
            "itemType": "journalArticle",
            "title": "Secure communication for the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Shahid",
                    "lastName": "Raza"
                },
                {
                    "creatorType": "author",
                    "firstName": "Simon",
                    "lastName": "Duquennoy"
                },
                {
                    "creatorType": "author",
                    "firstName": "Joel",
                    "lastName": "Höglund"
                },
                {
                    "creatorType": "author",
                    "firstName": "Utz",
                    "lastName": "Roedig"
                },
                {
                    "creatorType": "author",
                    "firstName": "Thiemo",
                    "lastName": "Voigt"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Security and Communication Networks",
            "publisher": "",
            "place": "",
            "date": "2012/01/18",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1002/sec.406",
            "citationKey": "",
            "url": "http://onlinelibrary.wiley.com/doi/10.1002/sec.406/abstract",
            "accessDate": "2012-06-18T15:09:58Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1939-0122",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "onlinelibrary.wiley.com",
            "callNumber": "0003",
            "rights": "Copyright © 2012 John Wiley & Sons, Ltd.",
            "extra": "00000",
            "tags": [
                {
                    "tag": "6LoWPAN",
                    "type": 1
                },
                {
                    "tag": "IEEE 802.15.4 Security",
                    "type": 1
                },
                {
                    "tag": "IPsec",
                    "type": 1
                },
                {
                    "tag": "Internet of Things",
                    "type": 1
                },
                {
                    "tag": "security",
                    "type": 1
                }
            ],
            "collections": [
                "ERIJPSQP"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:49:59Z",
            "dateModified": "2017-05-11T15:24:40Z"
        }
    },
    {
        "key": "AJUIF9NV",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/AJUIF9NV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/AJUIF9NV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Azimi-Sadjadi et al.",
            "parsedDate": "2007",
            "numChildren": 1
        },
        "data": {
            "key": "AJUIF9NV",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Robust key generation from signal envelopes in wireless networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Babak",
                    "lastName": "Azimi-Sadjadi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Aggelos",
                    "lastName": "Kiayias"
                },
                {
                    "creatorType": "author",
                    "firstName": "Alejandra",
                    "lastName": "Mercado"
                },
                {
                    "creatorType": "author",
                    "firstName": "Bulent",
                    "lastName": "Yener"
                }
            ],
            "abstractNote": "The broadcast nature of a wireless link provides a natural eavesdropping and intervention capability to an adversary. Thus, securing a wireless link is essential to the security of a wireless network, and key generation algorithms are necessary for securing wireless links. However, traditional key agreement algorithms can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. Traditional key agreement algorithms are not suitable for wireless ad-hoc networks since they consume scarce resources such as bandwidth and battery power. This paper presents a novel approach that couples the physical layer characteristics of wireless networks with key generation algorithms. It is based on the wireless communication phenomenon known as the principle of reciprocity which states that in the absence of interference both transmitter and receiver experience the same signal envelope. The key-observation here is that the signal envelope information can provide to the two transceivers two correlated random sources that provide sufficient amounts of entropy which can be used to extract a cryptographic key. In contrast, it is virtually impossible for a third party, which is not located at one of the transceiver's position, to obtain or predict the exact envelope; thus retrieve the key. Since in the presence of interference strict reciprocity property can not be maintained; our methodology is based on detecting deep fades to extract correlated bitstrings. In particular, we show how a pair of transceivers can reconcile such bitstrings and finally flatten their distribution to reach key agreement. In our constructions we use cryptographic tools related to randomness extraction and information reconciliation. We introduce \"secure fuzzy information reconciliators\" a tool that enables us to describe robust key generation systems in our setting. Finally we provide a computational study that presents a simulation of a wireless channel that demonstrates the feasibility of our approach and justifies the assumptions made in our analysis.",
            "proceedingsTitle": "Proceedings of the 14th ACM conference on Computer and communications security",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2007",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "401–410",
            "series": "CCS '07",
            "seriesNumber": "",
            "DOI": "10.1145/1315245.1315295",
            "ISBN": "978-1-59593-703-2",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1315245.1315295",
            "accessDate": "2012-06-18T13:49:50Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0103",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "physical layer security",
                    "type": 1
                },
                {
                    "tag": "randomness extraction",
                    "type": 1
                },
                {
                    "tag": "signal envelopes",
                    "type": 1
                },
                {
                    "tag": "wireless ad-hoc networks",
                    "type": 1
                }
            ],
            "collections": [
                "MDZS3ATJ",
                "VTPQE58D"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:48:19Z",
            "dateModified": "2017-05-11T15:24:39Z"
        }
    },
    {
        "key": "ADBK2BIA",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/ADBK2BIA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/ADBK2BIA",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Enck et al.",
            "parsedDate": "2010",
            "numChildren": 1
        },
        "data": {
            "key": "ADBK2BIA",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "William",
                    "lastName": "Enck"
                },
                {
                    "creatorType": "author",
                    "firstName": "Peter",
                    "lastName": "Gilbert"
                },
                {
                    "creatorType": "author",
                    "firstName": "Byung-Gon",
                    "lastName": "Chun"
                },
                {
                    "creatorType": "author",
                    "firstName": "Landon P.",
                    "lastName": "Cox"
                },
                {
                    "creatorType": "author",
                    "firstName": "Jaeyeon",
                    "lastName": "Jung"
                },
                {
                    "creatorType": "author",
                    "firstName": "Patrick",
                    "lastName": "McDaniel"
                },
                {
                    "creatorType": "author",
                    "firstName": "Anmol N.",
                    "lastName": "Sheth"
                }
            ],
            "abstractNote": "Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. We address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides realtime analysis by leveraging Android's virtualized execution environment. TaintDroid incurs only 14% performance overhead on a CPU-bound micro-benchmark and imposes negligible overhead on interactive third-party applications. Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, we found 68 instances of potential misuse of users' private information across 20 applications. Monitoring sensitive data with TaintDroid provides informed use of third-party applications for phone users and valuable input for smartphone security service firms seeking to identify misbehaving applications.",
            "proceedingsTitle": "Proceedings of the 9th USENIX conference on Operating systems design and implementation",
            "conferenceName": "",
            "publisher": "USENIX Association",
            "place": "Berkeley, CA, USA",
            "date": "2010",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "1–6",
            "series": "OSDI'10",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1924943.1924971",
            "accessDate": "2012-06-18T14:00:47Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "TaintDroid",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0311",
            "rights": "",
            "extra": "00000",
            "tags": [],
            "collections": [
                "VFBDGCAT"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:49:41Z",
            "dateModified": "2017-05-11T15:24:38Z"
        }
    },
    {
        "key": "ACC8JANI",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/ACC8JANI",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/ACC8JANI",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Mayrhofer and Welch",
            "parsedDate": "2007-04",
            "numChildren": 1
        },
        "data": {
            "key": "ACC8JANI",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "A Human-Verifiable Authentication Protocol Using Visible Laser Light",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Rene",
                    "lastName": "Mayrhofer"
                },
                {
                    "creatorType": "author",
                    "firstName": "Martyn",
                    "lastName": "Welch"
                }
            ],
            "abstractNote": "Securing wireless channels necessitates authenticating communication partners. For spontaneous interaction, authentication must be efficient and intuitive. One approach to create interaction and authentication methods that scale to using hundreds of services throughout the day is to rely on personal, trusted, mobile devices to interact with the environment. Authenticating the resulting device-to-device interactions requires an out-of-band channel that is verifiable by the user. We present a protocol for creating such an out-of-band channel with visible laser light that is secure against man-in-the-middle attacks even when the laser transmission is not confidential. A prototype implementation shows that an appropriate laser channel can be constructed with simple off-the-shelf components",
            "proceedingsTitle": "Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on",
            "conferenceName": "",
            "publisher": "",
            "place": "",
            "date": "april 2007",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "1143 -1148",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/ARES.2007.5",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "Authentication",
                    "type": 1
                },
                {
                    "tag": "channel",
                    "type": 1
                },
                {
                    "tag": "channel;visible",
                    "type": 1
                },
                {
                    "tag": "channels;",
                    "type": 1
                },
                {
                    "tag": "communication",
                    "type": 1
                },
                {
                    "tag": "communication;security",
                    "type": 1
                },
                {
                    "tag": "computing;optical",
                    "type": 1
                },
                {
                    "tag": "data;telecommunication",
                    "type": 1
                },
                {
                    "tag": "interaction;human-verifiable",
                    "type": 1
                },
                {
                    "tag": "laser",
                    "type": 1
                },
                {
                    "tag": "light;wireless",
                    "type": 1
                },
                {
                    "tag": "of",
                    "type": 1
                },
                {
                    "tag": "partners;device-to-device",
                    "type": 1
                },
                {
                    "tag": "protocol;laser",
                    "type": 1
                },
                {
                    "tag": "security;mobile",
                    "type": 1
                },
                {
                    "tag": "security;wireless",
                    "type": 1
                },
                {
                    "tag": "transmission;out-of-band",
                    "type": 1
                }
            ],
            "collections": [
                "3ZC86UEK",
                "R4KRXTD8"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:51:19Z",
            "dateModified": "2017-05-11T15:24:37Z"
        }
    },
    {
        "key": "A3NU22RB",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/A3NU22RB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/A3NU22RB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1154866,
                "username": "mihoelzl",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mihoelzl",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Bellovin and Merritt",
            "parsedDate": "1992",
            "numChildren": 2
        },
        "data": {
            "key": "A3NU22RB",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Encrypted key exchange: password-based protocols secure against dictionary attacks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "S.M.",
                    "lastName": "Bellovin"
                },
                {
                    "creatorType": "author",
                    "firstName": "Michael",
                    "lastName": "Merritt"
                }
            ],
            "abstractNote": "Classic cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. A combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced. In particular, a protocol relying on the counter-intuitive motion of using a secret key to encrypt a public key is presented. Such protocols are secure against active attacks, and have the property that the password is protected against offline dictionary attacks",
            "proceedingsTitle": ", 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. Proceedings",
            "conferenceName": ", 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. Proceedings",
            "publisher": "",
            "place": "",
            "date": "1992",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "72-84",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/RISP.1992.213269",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Encrypted key exchange",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "Authentication",
                    "type": 1
                },
                {
                    "tag": "Cryptographic protocols",
                    "type": 1
                },
                {
                    "tag": "Dictionaries",
                    "type": 1
                },
                {
                    "tag": "Protection",
                    "type": 1
                },
                {
                    "tag": "Random number generation",
                    "type": 1
                },
                {
                    "tag": "authorisation",
                    "type": 1
                },
                {
                    "tag": "cryptography",
                    "type": 1
                },
                {
                    "tag": "data privacy",
                    "type": 1
                },
                {
                    "tag": "glossaries",
                    "type": 1
                },
                {
                    "tag": "insecure network",
                    "type": 1
                },
                {
                    "tag": "message authentication",
                    "type": 1
                },
                {
                    "tag": "offline dictionary attacks",
                    "type": 1
                },
                {
                    "tag": "password-based protocols",
                    "type": 1
                },
                {
                    "tag": "protocols",
                    "type": 1
                },
                {
                    "tag": "public key",
                    "type": 1
                },
                {
                    "tag": "public key cryptography",
                    "type": 1
                },
                {
                    "tag": "public-key cryptography",
                    "type": 1
                },
                {
                    "tag": "secret-key cryptography",
                    "type": 1
                },
                {
                    "tag": "security",
                    "type": 1
                },
                {
                    "tag": "user-chosen keys",
                    "type": 1
                }
            ],
            "collections": [
                "T28JVZSE"
            ],
            "relations": {},
            "dateAdded": "2013-10-18T09:15:14Z",
            "dateModified": "2017-05-11T15:24:36Z"
        }
    },
    {
        "key": "9SS7HGJS",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/9SS7HGJS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/9SS7HGJS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1154866,
                "username": "mihoelzl",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mihoelzl",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Ruiz-Martinez et al.",
            "parsedDate": "2007",
            "numChildren": 2
        },
        "data": {
            "key": "9SS7HGJS",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Smartcard-Based e-Coin for Electronic Payments on the (Mobile) Internet",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "A.",
                    "lastName": "Ruiz-Martinez"
                },
                {
                    "creatorType": "author",
                    "firstName": "O.",
                    "lastName": "Canovas"
                },
                {
                    "creatorType": "author",
                    "firstName": "A.F.",
                    "lastName": "Gomez-Skarmeta"
                }
            ],
            "abstractNote": "Nowadays e-purses are not being offered as payment method on the Internet. This is mainly due to the fact that vendors have to integrate in their devices a security application module (SAM) to exchange security messages between the e-purse and that module during the payment phase. In this paper we introduce a new payment method that combines the main advantages of e-purses and the use of e-coins to make payments. This proposal does not need either a SAM to make and verify payments on the Internet nor an on-line e-coin validation. Thus, we introduce the possibility that this e-purse can be easily integrated in payment applications that vendors offer on the Internet. Moreover, our proposal is based on the use of Javacard applets with the aim of being used in both traditional Javacard-compliant smartcards and SIM smartcards, which involves that our proposal might be considered as a mobile payment system.",
            "proceedingsTitle": "Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007. SITIS '07",
            "conferenceName": "Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007. SITIS '07",
            "publisher": "",
            "place": "",
            "date": "2007",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "361-368",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/SITIS.2007.14",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "Application software",
                    "type": 1
                },
                {
                    "tag": "Credit cards",
                    "type": 1
                },
                {
                    "tag": "Hardware",
                    "type": 1
                },
                {
                    "tag": "Information security",
                    "type": 1
                },
                {
                    "tag": "Internet",
                    "type": 1
                },
                {
                    "tag": "Java",
                    "type": 1
                },
                {
                    "tag": "Javacard applets",
                    "type": 1
                },
                {
                    "tag": "Mobile communication",
                    "type": 1
                },
                {
                    "tag": "Mobile computing",
                    "type": 1
                },
                {
                    "tag": "Proposals",
                    "type": 1
                },
                {
                    "tag": "e-coin",
                    "type": 1
                },
                {
                    "tag": "e-purses",
                    "type": 1
                },
                {
                    "tag": "electronic coin",
                    "type": 1
                },
                {
                    "tag": "electronic money",
                    "type": 1
                },
                {
                    "tag": "electronic payment",
                    "type": 1
                },
                {
                    "tag": "electronic payments",
                    "type": 1
                },
                {
                    "tag": "electronic purse",
                    "type": 1
                },
                {
                    "tag": "mobile payment system",
                    "type": 1
                },
                {
                    "tag": "security application module",
                    "type": 1
                },
                {
                    "tag": "security messages",
                    "type": 1
                },
                {
                    "tag": "security of data",
                    "type": 1
                },
                {
                    "tag": "smart card",
                    "type": 1
                },
                {
                    "tag": "smart cards",
                    "type": 1
                },
                {
                    "tag": "smartcard",
                    "type": 1
                }
            ],
            "collections": [
                "KFEF5KE8"
            ],
            "relations": {},
            "dateAdded": "2013-10-18T09:14:49Z",
            "dateModified": "2017-05-11T15:24:35Z"
        }
    },
    {
        "key": "9QNI9CHS",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/9QNI9CHS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/9QNI9CHS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Borisov et al.",
            "parsedDate": "2004",
            "numChildren": 0
        },
        "data": {
            "key": "9QNI9CHS",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Off-the-record communication, or, why not to use PGP",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Nikita",
                    "lastName": "Borisov"
                },
                {
                    "creatorType": "author",
                    "firstName": "Ian",
                    "lastName": "Goldberg"
                },
                {
                    "creatorType": "author",
                    "firstName": "Eric",
                    "lastName": "Brewer"
                }
            ],
            "abstractNote": "Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryption keys (subject to compromise) for confidentiality, and digital signatures (which provide strong, and in some jurisdictions, legal, proof of authorship) for authenticity. In this paper, we argue that most social communications online should have just the opposite of the above two properties; namely, they should have <i>perfect forward secrecy</i> and <i>repudiability</i>. We present a protocol for secure online communication, called \"off-the-record messaging\", which has properties better-suited for casual conversation than do systems like PGP or S/MIME. We also present an implementation of off-the-record messaging as a plugin to the Linux GAIM instant messaging client. Finally, we discuss how to achieve similar privacy for high-latency communications such as email.",
            "proceedingsTitle": "",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2004",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "77–84",
            "series": "WPES '04",
            "seriesNumber": "",
            "DOI": "10.1145/1029179.1029200",
            "ISBN": "1-58113-968-3",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1029179.1029200",
            "accessDate": "2012-06-18T14:06:39Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0069",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "deniability",
                    "type": 1
                },
                {
                    "tag": "perfect forward secrecy",
                    "type": 1
                },
                {
                    "tag": "private communication",
                    "type": 1
                }
            ],
            "collections": [
                "MNXT94NN"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:45:25Z",
            "dateModified": "2017-05-11T15:24:34Z"
        }
    },
    {
        "key": "9PUXESQE",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/9PUXESQE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/9PUXESQE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Thompson",
            "parsedDate": "1984-08",
            "numChildren": 0
        },
        "data": {
            "key": "9PUXESQE",
            "version": 20,
            "itemType": "journalArticle",
            "title": "Reflections on trusting trust",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Ken",
                    "lastName": "Thompson"
                }
            ],
            "abstractNote": "To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.",
            "publicationTitle": "Commun. ACM",
            "publisher": "",
            "place": "",
            "date": "August 1984",
            "volume": "27",
            "issue": "8",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "761–763",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "10.1145/358198.358210",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/358198.358210",
            "accessDate": "2012-06-18T15:12:15Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0001-0782",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0547",
            "rights": "",
            "extra": "00000",
            "tags": [],
            "collections": [
                "MNXT94NN"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:45:25Z",
            "dateModified": "2017-05-11T15:24:33Z"
        }
    },
    {
        "key": "97KRKGFN",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/97KRKGFN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/97KRKGFN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1154866,
                "username": "mihoelzl",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mihoelzl",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Lucks",
            "parsedDate": "1998-01-01",
            "numChildren": 1
        },
        "data": {
            "key": "97KRKGFN",
            "version": 20,
            "itemType": "bookSection",
            "title": "Open key exchange: How to defeat dictionary attacks without encrypting public keys",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Stefan",
                    "lastName": "Lucks"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Bruce",
                    "lastName": "Christianson"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Bruno",
                    "lastName": "Crispo"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Mark",
                    "lastName": "Lomas"
                },
                {
                    "creatorType": "editor",
                    "firstName": "Michael",
                    "lastName": "Roe"
                }
            ],
            "abstractNote": "Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] proposed “encrypted key exchange” (EKE) protocols, to frustrate key-guessing attacks. EKE requires the use of asymmetric cryptosystems and is based on encrypting the public key, using a symmetric cipher. In this paper, a novel way of key exchange is presented, where public keys are sent openly, not encrypted. In contrast to EKE protocols, the same public-key/secret-key pair can be used for arbitrary many protocol executions. The RSA-based protocol variant is found to be quite efficient and practical. Compared to previous work on such protocols, a more solid formal treatment is given, influenced by the work of Bellare and Rogaway [3] on key exchange protocols for strong common secrets.",
            "bookTitle": "Security Protocols",
            "series": "Lecture Notes in Computer Science",
            "seriesNumber": "1361",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "1998/01/01",
            "publisher": "Springer Berlin Heidelberg",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "79-90",
            "ISBN": "978-3-540-64040-0 978-3-540-69688-9",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/BFb0028161",
            "accessDate": "2013-10-16T14:35:06Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Open key exchange",
            "language": "",
            "libraryCatalog": "link.springer.com",
            "callNumber": "",
            "rights": "©1998 Springer-Verlag",
            "extra": "00000",
            "tags": [
                {
                    "tag": "Algorithm Analysis and Problem Complexity",
                    "type": 1
                },
                {
                    "tag": "Combinatorics",
                    "type": 1
                },
                {
                    "tag": "Communications Engineering, Networks",
                    "type": 1
                },
                {
                    "tag": "Computer Communication Networks",
                    "type": 1
                },
                {
                    "tag": "Data Encryption",
                    "type": 1
                }
            ],
            "collections": [
                "T28JVZSE"
            ],
            "relations": {},
            "dateAdded": "2013-10-18T09:15:14Z",
            "dateModified": "2017-05-11T15:24:32Z"
        }
    },
    {
        "key": "8Z78XI83",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/8Z78XI83",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/8Z78XI83",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Bichler et al.",
            "parsedDate": "2007-11",
            "numChildren": 0
        },
        "data": {
            "key": "8Z78XI83",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "D.",
                    "lastName": "Bichler"
                },
                {
                    "creatorType": "author",
                    "firstName": "G.",
                    "lastName": "Stromberg"
                },
                {
                    "creatorType": "author",
                    "firstName": "M.",
                    "lastName": "Huemer"
                }
            ],
            "abstractNote": "In this paper we present a signal processing methodology for sharing symmetric keys in personal area networks. Symmetric encryption and decryption are commonly used because of limitations in computing power and energy consumption. However, key sharing still imposes challenges regarding usability, computational complexity of algebraic key exchange algorithms, and security. Our approach is that keys are generated locally on devices by shaking them, and that the keys are equal if and only if the devices are shaken together. Based on practical assessments, we show that the key generation algorithm is able to generate keys from acceleration data with an average entropy of 13bit/key in 70% of the cases.",
            "proceedingsTitle": "",
            "conferenceName": "",
            "publisher": "",
            "place": "",
            "date": "nov. 2007",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "177 -181",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/GLOCOM.2007.41",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "IEEE Xplore",
            "callNumber": "0005",
            "rights": "",
            "extra": "00000",
            "tags": [
                {
                    "tag": "algebraic",
                    "type": 1
                },
                {
                    "tag": "algorithm;computational",
                    "type": 1
                },
                {
                    "tag": "algorithm;personal",
                    "type": 1
                },
                {
                    "tag": "area",
                    "type": 1
                },
                {
                    "tag": "communication;algebra;computational",
                    "type": 1
                },
                {
                    "tag": "complexity;cryptography;personal",
                    "type": 1
                },
                {
                    "tag": "complexity;energy",
                    "type": 1
                },
                {
                    "tag": "consumption;key",
                    "type": 1
                },
                {
                    "tag": "consumption;signal",
                    "type": 1
                },
                {
                    "tag": "decryption;symmetric",
                    "type": 1
                },
                {
                    "tag": "encryption;wireless",
                    "type": 1
                },
                {
                    "tag": "exchange",
                    "type": 1
                },
                {
                    "tag": "generation",
                    "type": 1
                },
                {
                    "tag": "key",
                    "type": 1
                },
                {
                    "tag": "networks;",
                    "type": 1
                },
                {
                    "tag": "networks;power",
                    "type": 1
                },
                {
                    "tag": "processing;symmetric",
                    "type": 1
                }
            ],
            "collections": [
                "MNXT94NN"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:45:25Z",
            "dateModified": "2017-05-11T15:24:31Z"
        }
    },
    {
        "key": "79ATSM8E",
        "version": 20,
        "library": {
            "type": "group",
            "id": 94791,
            "name": "mobiledevicesecurity",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/mobiledevicesecurity",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/94791/items/79ATSM8E",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/mobiledevicesecurity/items/79ATSM8E",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1049468,
                "username": "rmayr",
                "name": "Rene Mayrhofer",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rmayr",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Kobsa et al.",
            "parsedDate": "2009",
            "numChildren": 1
        },
        "data": {
            "key": "79ATSM8E",
            "version": 20,
            "itemType": "conferencePaper",
            "title": "Serial hook-ups: a comparative usability study of secure device pairing methods",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Alfred",
                    "lastName": "Kobsa"
                },
                {
                    "creatorType": "author",
                    "firstName": "Rahim",
                    "lastName": "Sonawalla"
                },
                {
                    "creatorType": "author",
                    "firstName": "Gene",
                    "lastName": "Tsudik"
                },
                {
                    "creatorType": "author",
                    "firstName": "Ersin",
                    "lastName": "Uzun"
                },
                {
                    "creatorType": "author",
                    "firstName": "Yang",
                    "lastName": "Wang"
                }
            ],
            "abstractNote": "Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods have been proposed to mitigate these attacks, each requiring user assistance in authenticating information exchanged over the wireless channel via some human-perceptible auxiliary channels, e.g., visual, acoustic or tactile. In this paper, we present results of the first comprehensive and comparative study of eleven notable secure device pairing methods. Usability measures include: task performance times, ratings on System Usability Scale (SUS), task completion rates, and perceived security. Study subjects were controlled for age, gender and prior experience with device pairing. We present overall results and identify problematic methods for certain classes of users as well as methods best-suited for various device configurations.",
            "proceedingsTitle": "Proceedings of the 5th Symposium on Usable Privacy and Security",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "New York, NY, USA",
            "date": "2009",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "10:1–10:12",
            "series": "SOUPS '09",
            "seriesNumber": "",
            "DOI": "10.1145/1572532.1572546",
            "ISBN": "978-1-60558-736-3",
            "citationKey": "",
            "url": "http://doi.acm.org/10.1145/1572532.1572546",
            "accessDate": "2012-06-18T13:59:53Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Serial hook-ups",
            "language": "",
            "libraryCatalog": "ACM Digital Library",
            "callNumber": "0025",
            "rights": "",
            "extra": "00000",
            "tags": [],
            "collections": [
                "R4KRXTD8"
            ],
            "relations": {},
            "dateAdded": "2012-12-21T08:51:19Z",
            "dateModified": "2017-05-11T15:24:30Z"
        }
    }
]