{"id":"https://openalex.org/W4399752988","doi":"https://doi.org/10.1007/978-3-031-60391-4_1","title":"SPAWN: Seamless Proximity-Based Authentication by\u00a0Utilizing the\u00a0Existent WiFi Environment","display_name":"SPAWN: Seamless Proximity-Based Authentication by\u00a0Utilizing the\u00a0Existent WiFi Environment","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4399752988","doi":"https://doi.org/10.1007/978-3-031-60391-4_1"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-60391-4_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-60391-4_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.utwente.nl/en/publications/6abff4d5-8f03-49a4-beca-da1cb2e20a6c","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089630221","display_name":"Philipp Jakubeit","orcid":"https://orcid.org/0000-0001-6216-6100"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Philipp Jakubeit","raw_affiliation_strings":["University of Twente, Drienerlolaan 5, 7522 NB, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Drienerlolaan 5, 7522 NB, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056553463","display_name":"Peter Andreas","orcid":"https://orcid.org/0000-0003-2929-5001"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I129877168","display_name":"Carl von Ossietzky Universit\u00e4t Oldenburg","ror":"https://ror.org/033n9gh91","country_code":"DE","type":"education","lineage":["https://openalex.org/I129877168"]}],"countries":["DE","NL"],"is_corresponding":false,"raw_author_name":"Andreas Peter","raw_affiliation_strings":["Carl von Ossietzky Universit\u00e4t Oldenburg, Ammerl\u00e4nder Heerstra\u00dfe 114-118, 26129, Oldenburg, Germany","University of Twente, Drienerlolaan 5, 7522 NB, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"Carl von Ossietzky Universit\u00e4t Oldenburg, Ammerl\u00e4nder Heerstra\u00dfe 114-118, 26129, Oldenburg, Germany","institution_ids":["https://openalex.org/I129877168"]},{"raw_affiliation_string":"University of Twente, Drienerlolaan 5, 7522 NB, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027678871","display_name":"Maarten van Steen","orcid":"https://orcid.org/0000-0002-5113-2746"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Maarten van Steen","raw_affiliation_strings":["University of Twente, Drienerlolaan 5, 7522 NB, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Drienerlolaan 5, 7522 NB, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089630221"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26357947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spawn","display_name":"Spawn (biology)","score":0.9716616272926331},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8395562767982483},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6212193965911865},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37963777780532837},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3590465188026428},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30197522044181824}],"concepts":[{"id":"https://openalex.org/C17458331","wikidata":"https://www.wikidata.org/wiki/Q935672","display_name":"Spawn (biology)","level":2,"score":0.9716616272926331},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8395562767982483},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6212193965911865},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37963777780532837},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3590465188026428},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30197522044181824},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C505870484","wikidata":"https://www.wikidata.org/wiki/Q180538","display_name":"Fishery","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-031-60391-4_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-60391-4_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire/6abff4d5-8f03-49a4-beca-da1cb2e20a6c","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/6abff4d5-8f03-49a4-beca-da1cb2e20a6c","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Jakubeit, P, Peter, A & van Steen, M 2024, SPAWN : Seamless Proximity-Based Authentication by\u00a0Utilizing the\u00a0Existent WiFi Environment. in S Bouzefrane & D Sauveron (eds), Information Security Theory and Practice - 14th IFIP WG 11.2 International Conference, WISTP 2024, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14625 LNCS, Springer, pp. 1-16, 14th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2024, Paris, France, 29/02/24. https://doi.org/10.1007/978-3-031-60391-4_1","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-05251181v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-05251181","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"14th IFIP International Conference on Information Security Theory and Practice (WISTP), Feb 2024, Paris, France. pp.1-16, &#x27E8;10.1007/978-3-031-60391-4_1&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire/6abff4d5-8f03-49a4-beca-da1cb2e20a6c","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/6abff4d5-8f03-49a4-beca-da1cb2e20a6c","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Jakubeit, P, Peter, A & van Steen, M 2024, SPAWN : Seamless Proximity-Based Authentication by\u00a0Utilizing the\u00a0Existent WiFi Environment. in S Bouzefrane & D Sauveron (eds), Information Security Theory and Practice - 14th IFIP WG 11.2 International Conference, WISTP 2024, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14625 LNCS, Springer, pp. 1-16, 14th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2024, Paris, France, 29/02/24. https://doi.org/10.1007/978-3-031-60391-4_1","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1974216345","https://openalex.org/W2006976778","https://openalex.org/W2156765389","https://openalex.org/W2164253138","https://openalex.org/W2724229234","https://openalex.org/W2761420877","https://openalex.org/W2795178974","https://openalex.org/W2802012776","https://openalex.org/W2896384017","https://openalex.org/W2896886577","https://openalex.org/W2946673832","https://openalex.org/W2954508700","https://openalex.org/W3144195522","https://openalex.org/W3214336257","https://openalex.org/W4254243680","https://openalex.org/W4293057280","https://openalex.org/W4320012226","https://openalex.org/W4387272209","https://openalex.org/W4388470565"],"related_works":["https://openalex.org/W2411369201","https://openalex.org/W2017893186","https://openalex.org/W2347925189","https://openalex.org/W2359334753","https://openalex.org/W1985268346","https://openalex.org/W2344195838","https://openalex.org/W2009289327","https://openalex.org/W2141624220","https://openalex.org/W2331813980","https://openalex.org/W2912135041"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
