{"id":"https://openalex.org/W4229019527","doi":"https://doi.org/10.1145/3507657.3529651","title":"No Doppelg\u00e4nger","display_name":"No Doppelg\u00e4nger","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4229019527","doi":"https://doi.org/10.1145/3507657.3529651"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3529651","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3529651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077559749","display_name":"Felipe Boeira","orcid":"https://orcid.org/0000-0003-2707-8089"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Felipe Boeira","raw_affiliation_strings":["Link\u00f6ping University, Link\u00f6ping, Sweden"],"affiliations":[{"raw_affiliation_string":"Link\u00f6ping University, Link\u00f6ping, Sweden","institution_ids":["https://openalex.org/I102134673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052612328","display_name":"Mikael Asplund","orcid":"https://orcid.org/0000-0003-1916-3398"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Mikael Asplund","raw_affiliation_strings":["Link\u00f6ping University, Link\u00f6ping, Sweden"],"affiliations":[{"raw_affiliation_string":"Link\u00f6ping University, Link\u00f6ping, Sweden","institution_ids":["https://openalex.org/I102134673"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023690641","display_name":"Marinho Barcellos","orcid":"https://orcid.org/0000-0002-1505-6408"},"institutions":[{"id":"https://openalex.org/I52179390","display_name":"University of Waikato","ror":"https://ror.org/013fsnh78","country_code":"NZ","type":"education","lineage":["https://openalex.org/I52179390"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Marinho Barcellos","raw_affiliation_strings":["University of Waikato, Hamilton, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Waikato, Hamilton, New Zealand","institution_ids":["https://openalex.org/I52179390"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077559749"],"corresponding_institution_ids":["https://openalex.org/I102134673"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04656793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"280","last_page":"281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13167","display_name":"Historical, Literary, and Cultural Studies","score":0.9165999889373779,"subfield":{"id":"https://openalex.org/subfields/1205","display_name":"Classics"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.901199996471405,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5211156010627747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5211156010627747}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3507657.3529651","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3529651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:researchcommons.waikato.ac.nz:10289/16309","is_oa":false,"landing_page_url":"https://hdl.handle.net/10289/16309","pdf_url":null,"source":{"id":"https://openalex.org/S4306400944","display_name":"Research Commons (University of Waikato)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I52179390","host_organization_name":"University of Waikato","host_organization_lineage":["https://openalex.org/I52179390"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"WiSec 2022","raw_type":"Conference Contribution"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2809727329","https://openalex.org/W3167472015"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"The":[0],"expansion":[1],"of":[2,21,49,61,110],"mobile":[3,50],"network":[4,92],"capabilities":[5],"throughout":[6],"the":[7,14,18,47,59,91,108,112],"decades":[8],"has":[9],"increased":[10],"people's":[11],"exposure":[12],"to":[13,26,69,80,119],"digital":[15],"world,":[16],"and":[17,30,35,40,67,94],"next":[19],"generations":[20],"communication":[22],"networks":[23],"are":[24,41],"expected":[25],"achieve":[27],"ubiquitous":[28],"connectivity":[29],"immersive":[31],"use":[32,60],"cases.":[33],"Security":[34],"privacy":[36,68],"concerns":[37],"have":[38],"arisen":[39],"continuously":[42],"taken":[43],"into":[44],"account":[45],"in":[46,58],"design":[48],"networks.":[51],"However,":[52],"a":[53,117],"relevant":[54],"limitation":[55],"currently":[56],"lies":[57],"shared":[62],"secrets":[63],"for":[64],"providing":[65,111],"security":[66],"users.":[70],"Ideally,":[71],"we":[72,103],"believe":[73],"that":[74],"users'":[75],"identities":[76],"should":[77],"be":[78],"immune":[79],"impersonation":[81],"as":[82,84],"long":[83],"their":[85],"own":[86],"devices":[87],"remain":[88],"secure,":[89],"notwithstanding":[90],"operators":[93],"other":[95],"entities":[96],"potentially":[97],"being":[98],"compromised.":[99],"In":[100],"this":[101,105],"paper,":[102],"develop":[104],"idea":[106],"with":[107],"objective":[109],"non-repudiation":[113],"property,":[114],"which":[115],"represents":[116],"mitigation":[118],"its":[120],"dual,":[121],"impersonation.":[122]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-08T00:00:00"}
