-
1
-
-
84861266702
-
-
Nov.
-
CoolTown. http://www.cooltown.com/, Nov. 2004.
-
(2004)
-
-
-
2
-
-
84861255212
-
-
Nov.
-
Trusted Computing Group. http://www.trustedcoraputinggroup.org/, Nov. 2004.
-
(2004)
-
-
-
3
-
-
1142270162
-
-
Prentice Hall
-
B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. Trusted Computing Platforms - TCPA Technology in Context. Prentice Hall, 2003.
-
(2003)
Trusted Computing Platforms - TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
6
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary atttacks and password file compromise
-
S. Bellovin and M. Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 244-250, 1993.
-
(1993)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 244-250
-
-
Bellovin, S.1
Merrit, M.2
-
9
-
-
27544512701
-
The untrusted computer problem and camera-based authentication
-
Aug.
-
M. Burnside, D. Clarke, B. Gassend, T. Kotwal, M. Burnside, S. Devadas, and R. Rivest. The untrusted computer problem and camera-based authentication. In Proceedings of Pervasive Computing (Pervasive), Aug. 2002.
-
(2002)
Proceedings of Pervasive Computing (Pervasive)
-
-
Burnside, M.1
Clarke, D.2
Gassend, B.3
Kotwal, T.4
Burnside, M.5
Devadas, S.6
Rivest, R.7
-
15
-
-
27544471462
-
Secure web authentication with mobile phones using keyed hash authentication
-
Harvard University Extension, Jan.
-
E. Gieseke and J. McLaughlin. Secure web authentication with mobile phones using keyed hash authentication. CSCI E 170 Final Project, Harvard University Extension, Jan. 2005.
-
(2005)
CSCI e 170 Final Project
-
-
Gieseke, E.1
McLaughlin, J.2
-
26
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. R. Verheul. Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255-293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
27
-
-
27544481812
-
-
Personal communication
-
R. Levien. PGP snowflake. Personal communication, 1996.
-
(1996)
PGP Snowflake
-
-
Levien, R.1
-
34
-
-
19944391466
-
Using camera-equipped mobile phones for interacting with real-world objects
-
Apr.
-
M. Rohs and B. Gfeller. Using camera-equipped mobile phones for interacting with real-world objects. Proceedings of Advances in Pervasive Computing, pages 265-271, Apr. 2004.
-
(2004)
Proceedings of Advances in Pervasive Computing
, pp. 265-271
-
-
Rohs, M.1
Gfeller, B.2
-
35
-
-
0036785515
-
A composable framework for secure multi-modal access to Internet services from post-PC devices
-
Oct.
-
S. Ross, J. Hill, M. Chen, A. D. Joseph, D. Culler, and E. Brewer. A composable framework for secure multi-modal access to Internet services from post-PC devices. In Mobile Networks and Applications (Special Issue: Selected papers from WMCSA 2000), pages 389-406, Oct. 2002.
-
(2002)
Mobile Networks and Applications (Special Issue: Selected Papers from WMCSA 2000)
, pp. 389-406
-
-
Ross, S.1
Hill, J.2
Chen, M.3
Joseph, A.D.4
Culler, D.5
Brewer, E.6
-
36
-
-
84861268771
-
-
RVSI Acuity CiMatrix. Data matrix barcodes, http://www.rvsi.com/ acuitycimatrix/index.htm, 2005.
-
(2005)
Data Matrix Barcodes
-
-
-
37
-
-
84878628745
-
General packet radio service (GPRS)
-
Sept.
-
P. Rysavy. General packet radio service (GPRS). GSM Data Today, Sept. 1998.
-
(1998)
GSM Data Today
-
-
Rysavy, P.1
-
40
-
-
85084163031
-
Design of the EROS trusted window system
-
J. S. Shapiro, J. Vanderburgh, E. Northup, and D. Chizmadia. Design of the EROS trusted window system. In Proceedings of the USENIX Security Symposium, pages 165-178, 2004.
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 165-178
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
Chizmadia, D.4
-
43
-
-
84861266698
-
-
PDF417. Feb.
-
Symbol Technologies. PDF417. http://www.pdf417.com/, Feb. 2005.
-
(2005)
-
-
-
45
-
-
27544471059
-
-
Oct.. Version 1.2, Revision 62
-
Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands, http://www.trustedcomputinggroup.org, Oct. 2003. Version 1.2, Revision 62.
-
(2003)
Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands
-
-
-
47
-
-
84861262551
-
-
Feb.
-
United Parcel Service. MaxiCode. http://www.maxicode.com/, Feb. 2005.
-
(2005)
-
-
|