-
2
-
-
84945588227
-
Smartits friends: A technique for users to easily establish connections between smart artefacts
-
Springer-Verlag
-
Holmquist, L.E., Mattern, F., Schiele, B., A., P., Beigl, M., Gellersen, H.W.: Smartits friends: A technique for users to easily establish connections between smart artefacts. In: Proc. UbiComp 2001, Springer-Verlag (2001) 116-122
-
(2001)
Proc. UbiComp
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.A.P.3
Beigl, M.4
Gellersen, H.W.5
-
3
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer-Verlag
-
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. 7th Int. Workshop on Security Protocols, Springer-Verlag (1999) 172-194
-
(1999)
Proc. 7th Int. Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
4
-
-
34547694372
-
Evidently secure device associations
-
Technical Report HPL-2005-40, HP Laboratories Bristol
-
Kindberg, T., Zhang, K., Im, S.H.: Evidently secure device associations. Technical Report HPL-2005-40, HP Laboratories Bristol (2005)
-
(2005)
-
-
Kindberg, T.1
Zhang, K.2
Im, S.H.3
-
5
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
6th Information Security Conf, Springer-Verlag
-
Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Proc. ISC'03: 6th Information Security Conf., Springer-Verlag (2003) 44-53
-
(2003)
Proc. ISC'03
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
6
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
IEEE CS Press
-
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. IEEE Symp. on Security and Privacy, IEEE CS Press (2005) 110-124
-
(2005)
Proc. IEEE Symp. on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
7
-
-
33947635594
-
Loud and clear: Human verifiable authentication based on audio
-
IEEE CS Press
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human verifiable authentication based on audio. In: Proc. ICDCS 2006: 26th Conf. on Distributed Computing Systems, IEEE CS Press (2006) 10
-
(2006)
Proc. ICDCS 2006: 26th Conf. on Distributed Computing Systems
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
8
-
-
33745926210
-
LoKey: Leveraging the sms network in decentralized, end-to-end trust establishment
-
Springer-Verlag
-
Nicholson, A.J., Smith, I.E., Hughes, J., Noble, B.D.: LoKey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Proc. Pervasive 2006, Springer-Verlag (2006) 202-219
-
(2006)
Proc. Pervasive
, pp. 202-219
-
-
Nicholson, A.J.1
Smith, I.E.2
Hughes, J.3
Noble, B.D.4
-
9
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Cagalj, M., Capkun, S., Hubaux, J.P.: Key agreement in peer-to-peer wireless networks. IEEE (Special Issue on Cryptography and Security) 94 (2006) 467-478
-
(2006)
IEEE (Special Issue on Cryptography and Security)
, vol.94
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.P.3
-
10
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7 (2004) 29-37
-
(2004)
RSA Cryptobytes
, vol.7
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
11
-
-
77953853641
-
-
ACM Press
-
Castelluccia, C., Mutaf, P.: Shake them up! In: Proc. MobiSys 2005: 3rd Int. Conf. on Mobile Systems, Applications, and Services, ACM Press (2005) 51-64
-
(2005)
Shake them up! In: Proc. MobiSys 2005: 3rd Int. Conf. on Mobile Systems, Applications, and Services
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
13
-
-
35048881618
-
Are you with me? - Using accelerometers to determine if two devices are carried by the same person
-
Springer-Verlag
-
Lester, J., Hannaford, B., Borriello, G.: "Are you with me?" - Using accelerometers to determine if two devices are carried by the same person. In: Proc. Pervasive 2004, Springer-Verlag (2004) 33-50
-
(2004)
Proc. Pervasive
, pp. 33-50
-
-
Lester, J.1
Hannaford, B.2
Borriello, G.3
-
15
-
-
35048903707
-
Automatic calibration of body worn acceleration sensors
-
Springer-Verlag
-
Lukowicz, P., Junker, H., Tröster, G.: Automatic calibration of body worn acceleration sensors. In: Proc. Pervasive 2004, Springer-Verlag (2004) 176-181
-
(2004)
Proc. Pervasive
, pp. 176-181
-
-
Lukowicz, P.1
Junker, H.2
Tröster, G.3
-
16
-
-
33750828045
-
-
Aylward, R., Lovell, S.D., Paradiso, J.A.: A compact, wireless, wearable sensor network for interactive dance ensembles. In: Proc. BSN 2006: Int. Workshop on Wearable and Implantable Body Sensor Networks, IEEE CS Press (2006) 65-68
-
Aylward, R., Lovell, S.D., Paradiso, J.A.: A compact, wireless, wearable sensor network for interactive dance ensembles. In: Proc. BSN 2006: Int. Workshop on Wearable and Implantable Body Sensor Networks, IEEE CS Press (2006) 65-68
-
-
-
-
17
-
-
38149092026
-
Analyzing features for activity recognition
-
Proc. Soc-EUSAI 2005. ACM Int. Conf, ACM Press
-
Huynh, T., Schiele, B.: Analyzing features for activity recognition. In: Proc. Soc-EUSAI 2005. ACM Int. Conf. Proceeding Series, ACM Press (2005) 159-163
-
(2005)
Proceeding Series
, pp. 159-163
-
-
Huynh, T.1
Schiele, B.2
-
21
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
Springer-Verlag
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Proc. CRYPTO 2005, Springer-Verlag (2005)
-
(2005)
Proc. CRYPTO
-
-
Vaudenay, S.1
-
22
-
-
33646754186
-
Finding collisions in the full SHA-1
-
Springer-Verlag
-
Wang, X., Yin, Y., Yu, H.: Finding collisions in the full SHA-1. In: Proc. CRYPTO 2005, Springer-Verlag (2005)
-
(2005)
Proc. CRYPTO
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
|