{"id":"https://openalex.org/W4387857694","doi":"https://doi.org/10.56553/popets-2024-0026","title":"SocIoTy: Practical Cryptography in Smart Home Contexts","display_name":"SocIoTy: Practical Cryptography in Smart Home Contexts","publication_year":2023,"publication_date":"2023-10-22","ids":{"openalex":"https://openalex.org/W4387857694","doi":"https://doi.org/10.56553/popets-2024-0026"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2024-0026","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2024-0026","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0026.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2024/popets-2024-0026.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027680930","display_name":"Tushar M. Jois","orcid":"https://orcid.org/0000-0002-2740-8407"},"institutions":[{"id":"https://openalex.org/I125687163","display_name":"City College of New York","ror":"https://ror.org/00wmhkr98","country_code":"US","type":"education","lineage":["https://openalex.org/I125687163"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tushar M. Jois","raw_affiliation_strings":["City College of New York"],"affiliations":[{"raw_affiliation_string":"City College of New York","institution_ids":["https://openalex.org/I125687163"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037548263","display_name":"Gabrielle Beck","orcid":"https://orcid.org/0009-0006-0026-5094"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gabrielle Beck","raw_affiliation_strings":["Johns Hopkins University"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007893376","display_name":"Sofia Belikovetsky","orcid":"https://orcid.org/0000-0003-1562-0707"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sofia Belikovetsky","raw_affiliation_strings":["Johns Hopkins University"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090846881","display_name":"Joseph Carrigan","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph Carrigan","raw_affiliation_strings":["Johns Hopkins University"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018751868","display_name":"Alishah Chator","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alishah Chator","raw_affiliation_strings":["Boston University"],"affiliations":[{"raw_affiliation_string":"Boston University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093108477","display_name":"Logan Kostick","orcid":"https://orcid.org/0009-0003-9367-4185"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Logan Kostick","raw_affiliation_strings":["Johns Hopkins University"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023758654","display_name":"Maximilian Zinkus","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maximilian Zinkus","raw_affiliation_strings":["Johns Hopkins University"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091589622","display_name":"Gabriel Kaptchuk","orcid":"https://orcid.org/0000-0002-8886-4748"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gabriel Kaptchuk","raw_affiliation_strings":["Boston University"],"affiliations":[{"raw_affiliation_string":"Boston University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111499449","display_name":"Aviel D. Rubin","orcid":"https://orcid.org/0000-0002-1061-8555"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aviel D. Rubin","raw_affiliation_strings":["Johns Hopkins University"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5027680930"],"corresponding_institution_ids":["https://openalex.org/I125687163"],"apc_list":null,"apc_paid":null,"fwci":0.453,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70341681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"2024","issue":"1","first_page":"447","last_page":"464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8222364187240601},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7441809773445129},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6275763511657715},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5793997049331665},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5519923567771912},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5228450894355774},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.496902734041214},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.46971505880355835},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4692993760108948},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4582348167896271},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4178040027618408},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.41231662034988403},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2813973128795624},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18062391877174377}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8222364187240601},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7441809773445129},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6275763511657715},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5793997049331665},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5519923567771912},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5228450894355774},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.496902734041214},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.46971505880355835},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4692993760108948},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4582348167896271},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4178040027618408},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.41231662034988403},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2813973128795624},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18062391877174377},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.56553/popets-2024-0026","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2024-0026","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0026.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.56553/popets-2024-0026","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2024-0026","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0026.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1413547058","display_name":null,"funder_award_id":"HR0011202002","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G1778829304","display_name":null,"funder_award_id":"1955172","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4161730871","display_name":"MPS-BIO: Collaborative Research: Physical Mechanisms Regulating Sperm Chemotaxis","funder_award_id":"1120200","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4858890005","display_name":"SaTC: CORE: Medium: Collaborative: Theory and Practice of Cryptosystems Secure Against Subversion","funder_award_id":"1801479","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4895123784","display_name":"CAREER: Towards Secure and Policy-Compliant Encrypted Communications","funder_award_id":"1653110","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G639234436","display_name":null,"funder_award_id":"HR00112020021","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G7698193007","display_name":null,"funder_award_id":"2030859","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4387857694.pdf"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W131466417","https://openalex.org/W145176944","https://openalex.org/W190079102","https://openalex.org/W335129981","https://openalex.org/W632399495","https://openalex.org/W1538384175","https://openalex.org/W1540322871","https://openalex.org/W1544394971","https://openalex.org/W1562783580","https://openalex.org/W1582832762","https://openalex.org/W1583834646","https://openalex.org/W1656678770","https://openalex.org/W1764343392","https://openalex.org/W1908897196","https://openalex.org/W1952573265","https://openalex.org/W2006453614","https://openalex.org/W2027471022","https://openalex.org/W2060544364","https://openalex.org/W2088492763","https://openalex.org/W2110419431","https://openalex.org/W2118662335","https://openalex.org/W2164090669","https://openalex.org/W2234639732","https://openalex.org/W2552640487","https://openalex.org/W2601292847","https://openalex.org/W2609427685","https://openalex.org/W2621097437","https://openalex.org/W2761800654","https://openalex.org/W2766917641","https://openalex.org/W2768626059","https://openalex.org/W2889239789","https://openalex.org/W2901658766","https://openalex.org/W2907544222","https://openalex.org/W2955474903","https://openalex.org/W2960126575","https://openalex.org/W2969503317","https://openalex.org/W2983008824","https://openalex.org/W2989044540","https://openalex.org/W3011824189","https://openalex.org/W3030069653","https://openalex.org/W3038091381","https://openalex.org/W3047126392","https://openalex.org/W3091014139","https://openalex.org/W3091883733","https://openalex.org/W3102035634","https://openalex.org/W3103284591","https://openalex.org/W3108672920","https://openalex.org/W3153061066","https://openalex.org/W4234533504","https://openalex.org/W4247880855","https://openalex.org/W4391285994"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2656445685","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W1989237518","https://openalex.org/W4388150944","https://openalex.org/W2134080857","https://openalex.org/W2002093701"],"abstract_inverted_index":{"Smartphones":[0],"form":[1],"an":[2,23,159],"important":[3],"source":[4],"of":[5,61,67,71,78,150,158],"trust":[6],"in":[7,29,44,128,136,181],"modern":[8],"computing.":[9],"But,":[10],"while":[11,123,194],"their":[12,30,39],"mobility":[13],"is":[14,109,187],"convenient,":[15],"smartphones":[16],"can":[17,97],"be":[18,98],"stolen":[19],"or":[20],"seized,":[21],"allowing":[22],"adversary":[24],"to":[25,56,83,111,174,189,198],"impersonate":[26],"the":[27,34,69,76,199],"user":[28],"digital":[31],"life:":[32],"accessing":[33],"user's":[35,52,80],"services":[36],"and":[37,104,119,133,140,170,176],"decrypting":[38],"sensitive":[40],"files.":[41],"With":[42],"this":[43,129],"mind,":[45],"we":[46,88],"build":[47],"SocIoTy,":[48],"which":[49,87],"leverages":[50],"a":[51,58,79,163,168],"existing":[53],"IoT":[54,151,172],"devices":[55,77,173],"add":[57],"context-sensitive":[59],"layer":[60],"security":[62],"for":[63,143],"non-expert":[64],"users.":[65],"Instead":[66],"assuming":[68],"existence":[70],"dedicated":[72],"hardware,":[73],"SocIoTy":[74,107,135,186],"re-uses":[75],"smart":[81,165,200],"home":[82,201],"provide":[84,112,141,155,190],"cryptographic":[85,102,145],"services,":[86],"term":[89],"at-home":[90,95],"cryptography.":[91],"We":[92,131,153],"show":[93],"that":[94,105],"cryptography":[96,193],"built":[99],"from":[100],"simple":[101],"primitives,":[103],"our":[106],"solution":[108],"able":[110,188],"useful":[113],"functionalities,":[114],"like":[115],"two-factor":[116],"authentication":[117],"(2FA)":[118],"secure":[120],"file":[121],"storage,":[122],"protecting":[124],"against":[125],"powerful":[126],"adversaries":[127],"setting.":[130],"implement":[132],"evaluate":[134],"real-world":[137],"use":[138],"cases":[139],"microbenchmarks":[142],"individual":[144],"operations":[146],"on":[147,162],"realistic":[148],"models":[149],"devices.":[152],"also":[154],"full":[156],"benchmarks":[157],"end-to-end":[160],"deployment":[161],"simulated":[164],"home,":[166],"using":[167],"smartphone":[169],"9":[171],"generate":[175],"display":[177],"2FA":[178],"one-time":[179],"passwords":[180],"less":[182],"than":[183],"200":[184],"milliseconds.":[185],"strong,":[191],"practical":[192],"binding":[195],"its":[196],"execution":[197],"itself,":[202],"all":[203],"without":[204],"requiring":[205],"additional":[206],"hardware.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
