메뉴 건너뛰기




Volumn 4631 LNCS, Issue , 2007, Pages 112-127

Multi-channel protocols

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMMUNICATION CHANNELS (INFORMATION THEORY); INFORMATION RETRIEVAL; MESSAGE PASSING; SIGNAL ENCODING;

EID: 38149095593     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77156-2_14     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 2
    • 0004215976 scopus 로고
    • A Logic of Authentication
    • Tech. Rep. 39, DEC SRC February
    • Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Tech. Rep. 39, DEC SRC (February 1989)
    • (1989)
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 3
    • 33645409711 scopus 로고    scopus 로고
    • Enhancements to Bluetooth Baseband Security
    • November
    • Gehrmann, C., Nyberg, K.: Enhancements to Bluetooth Baseband Security. In: Proc. Nordsec 2001 (November 2001)
    • (2001) Proc. Nordsec
    • Gehrmann, C.1    Nyberg, K.2
  • 4
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. Cryptobytes 7(1), 29-37 (2004)
    • (2004) Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 6
    • 34247333484 scopus 로고    scopus 로고
    • The Ephemeral Pairing Problem
    • Juels, A, ed, FC, Springer, Heidelberg
    • Hoepman, J.-H.: The Ephemeral Pairing Problem. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 212-226. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 7
    • 31344471100 scopus 로고    scopus 로고
    • Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, pp. 149-161. Springer, Heidelberg (2003)
    • Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149-161. Springer, Heidelberg (2003)
  • 8
    • 38149015773 scopus 로고    scopus 로고
    • Seeing is Believing: Using CameraPhones for Human-Verifiable Authentication
    • Tech. Rep. CMU-CS-04-174, Carnegie Mellon University
    • McCune, J.M., Perrig, A., Reiter, M.K.: Seeing is Believing: Using CameraPhones for Human-Verifiable Authentication. Tech. Rep. CMU-CS-04-174, Carnegie Mellon University (2004)
    • (2004)
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 10
    • 84947916257 scopus 로고    scopus 로고
    • The Cocaine Auction Protocol - On The Power Of Anonymous Broadcast
    • Pfitzmann, A, ed, IH, Springer, Heidelberg
    • Stajano, F., Anderson, R.: The Cocaine Auction Protocol - On The Power Of Anonymous Broadcast. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, Springer, Heidelberg (2000)
    • (1999) LNCS , vol.1768
    • Stajano, F.1    Anderson, R.2
  • 11
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling -Security issues for Ad-Hoc Wireless Networks
    • Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols, Springer, Heidelberg
    • Stajano, F., Anderson, R.: The Resurrecting Duckling -Security issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1796
    • Stajano, F.1    Anderson, R.2
  • 12
    • 33745715767 scopus 로고    scopus 로고
    • Using cameraphones to interact with context-aware mobile services
    • Tech. Rep. UCAM-CL-TR-609, University of Cambridge Computer Laboratory December
    • Toye, E., Madhavapeddy, A., Sharp, R., Scott, D., Blackwell, A.: Using cameraphones to interact with context-aware mobile services. Tech. Rep. UCAM-CL-TR-609, University of Cambridge Computer Laboratory (December 2004)
    • (2004)
    • Toye, E.1    Madhavapeddy, A.2    Sharp, R.3    Scott, D.4    Blackwell, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.