{"id":"https://openalex.org/W2956393505","doi":"https://doi.org/10.1145/3339252.3340334","title":"Privacy-Enhancing Context Authentication from Location-Sensitive Data","display_name":"Privacy-Enhancing Context Authentication from Location-Sensitive Data","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2956393505","doi":"https://doi.org/10.1145/3339252.3340334","mag":"2956393505"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3340334","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1904.08800","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069211791","display_name":"Pradip Mainali","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pradip Mainali","raw_affiliation_strings":["OneSpan Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"OneSpan Brussels, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065644902","display_name":"Carlton Shepherd","orcid":"https://orcid.org/0000-0002-7366-9034"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Carlton Shepherd","raw_affiliation_strings":["OneSpan Cambridge, United Kingdom"],"affiliations":[{"raw_affiliation_string":"OneSpan Cambridge, United Kingdom","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034842337","display_name":"Fabien A. P. Petitcolas","orcid":"https://orcid.org/0000-0002-4108-3899"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fabien A. P. Petitcolas","raw_affiliation_strings":["OneSpan Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"OneSpan Brussels, Belgium","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069211791"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.36401004,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66877863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7842004299163818},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5532721877098083},{"id":"https://openalex.org/keywords/locality-sensitive-hashing","display_name":"Locality-sensitive hashing","score":0.5464363098144531},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5034508109092712},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48889079689979553},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.471788614988327},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4448016881942749},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42790722846984863},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.41905999183654785},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3710950016975403},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.24565505981445312},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23728224635124207},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.22481012344360352},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.09206807613372803}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7842004299163818},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5532721877098083},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.5464363098144531},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5034508109092712},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48889079689979553},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.471788614988327},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4448016881942749},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42790722846984863},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.41905999183654785},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3710950016975403},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.24565505981445312},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23728224635124207},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.22481012344360352},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.09206807613372803},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3339252.3340334","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1904.08800","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1904.08800","pdf_url":"https://arxiv.org/pdf/1904.08800","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2956393505","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1904.08800v2","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1904.08800","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1904.08800","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1904.08800","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1904.08800","pdf_url":"https://arxiv.org/pdf/1904.08800","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2956393505.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W140353411","https://openalex.org/W640039046","https://openalex.org/W1459303179","https://openalex.org/W1571429834","https://openalex.org/W1836919303","https://openalex.org/W1842813322","https://openalex.org/W1873414311","https://openalex.org/W1971520550","https://openalex.org/W2036236138","https://openalex.org/W2055190948","https://openalex.org/W2066375491","https://openalex.org/W2068238369","https://openalex.org/W2073459066","https://openalex.org/W2101234009","https://openalex.org/W2111303254","https://openalex.org/W2115973169","https://openalex.org/W2124020982","https://openalex.org/W2130540277","https://openalex.org/W2132172731","https://openalex.org/W2147658271","https://openalex.org/W2155196221","https://openalex.org/W2163642647","https://openalex.org/W2165005140","https://openalex.org/W2181155974","https://openalex.org/W2227394822","https://openalex.org/W2527683646","https://openalex.org/W2616948640","https://openalex.org/W2765667105","https://openalex.org/W2997591727"],"related_works":["https://openalex.org/W2968934610","https://openalex.org/W2938275263","https://openalex.org/W2108518188","https://openalex.org/W3105251391","https://openalex.org/W1999549492","https://openalex.org/W2189515228","https://openalex.org/W2096468103","https://openalex.org/W2152268105","https://openalex.org/W2111369614","https://openalex.org/W2467224121","https://openalex.org/W1937328879","https://openalex.org/W2963963190","https://openalex.org/W3163443092","https://openalex.org/W2171294248","https://openalex.org/W2591756402","https://openalex.org/W2963188700","https://openalex.org/W2129117379","https://openalex.org/W2983522802","https://openalex.org/W3023919397","https://openalex.org/W2962361592"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,13,34,45,77,104,114],"new":[4],"privacy-enhancing,":[5],"context-aware":[6],"user":[7],"authentication":[8,60,119],"system,":[9],"ConSec,":[10],"which":[11,52,100],"uses":[12],"transformation":[14],"of":[15,48,79],"general":[16],"location-sensitive":[17,121],"data,":[18,51,74],"such":[19],"as":[20],"GPS":[21],"location,":[22],"barometric":[23],"altitude":[24],"and":[25,72,81,92,106],"noise":[26],"levels,":[27],"collected":[28,96],"from":[29,70,97,120],"the":[30,49,89],"user's":[31],"device,":[32],"into":[33],"representation":[35],"based":[36],"on":[37],"locality-sensitive":[38],"hashing":[39],"(LSH).":[40],"The":[41],"resulting":[42],"hashes":[43],"provide":[44],"dimensionality":[46],"reduction":[47],"underlying":[50],"we":[53],"leverage":[54],"to":[55],"model":[56],"users'":[57],"behaviour":[58],"for":[59,88,117],"using":[61,94],"machine":[62],"learning.":[63],"We":[64,109],"present":[65],"how":[66],"ConSec":[67,84],"supports":[68],"learning":[69],"categorical":[71],"numerical":[73],"while":[75],"addressing":[76],"number":[78],"on-device":[80],"network-based":[82],"threats.":[83],"is":[85,101],"implemented":[86],"subsequently":[87],"Android":[90],"platform":[91],"evaluated":[93],"data":[95,122],"35":[98],"users,":[99],"followed":[102],"by":[103],"security":[105],"privacy":[107],"analysis.":[108],"demonstrate":[110],"that":[111],"LSH":[112],"presents":[113],"useful":[115],"approach":[116],"context":[118],"without":[123],"directly":[124],"utilising":[125],"plain":[126],"measurements.":[127]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
