CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
The Shazam music recognition service
Communications of the ACM - Music information retrieval
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.02 |
Context-based authentication methods enable the unobtrusive establishment of authentication or even secure keys. While several context-based authentication methods have been proposed recently, often the entropy of the seed for the cryptographic keys is not exploited. We study the entropy of audio fingerprints which can be utilized to pair devices in close proximity. In this work, for 600 audio fingerprints from five distinct audio classes recorded at three different locations, we applied 7490 statistical tests from the dieHarder battery of statistical tests.