-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium (February 2002)
-
(2002)
Network and Distributed System Security Symposium (February
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
2
-
-
0004215976
-
A Logic of Authentication
-
Tech. Rep. 39, DEC SRC February
-
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Tech. Rep. 39, DEC SRC (February 1989)
-
(1989)
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
33645409711
-
Enhancements to Bluetooth Baseband Security
-
November
-
Gehrmann, C., Nyberg, K.: Enhancements to Bluetooth Baseband Security. In: Proc. Nordsec 2001 (November 2001)
-
(2001)
Proc. Nordsec
-
-
Gehrmann, C.1
Nyberg, K.2
-
4
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. Cryptobytes 7(1), 29-37 (2004)
-
(2004)
Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
6
-
-
34247333484
-
The Ephemeral Pairing Problem
-
Juels, A, ed, FC, Springer, Heidelberg
-
Hoepman, J.-H.: The Ephemeral Pairing Problem. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 212-226. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 212-226
-
-
Hoepman, J.-H.1
-
7
-
-
31344471100
-
-
Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, pp. 149-161. Springer, Heidelberg (2003)
-
Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149-161. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
38149015773
-
Seeing is Believing: Using CameraPhones for Human-Verifiable Authentication
-
Tech. Rep. CMU-CS-04-174, Carnegie Mellon University
-
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing is Believing: Using CameraPhones for Human-Verifiable Authentication. Tech. Rep. CMU-CS-04-174, Carnegie Mellon University (2004)
-
(2004)
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
10
-
-
84947916257
-
The Cocaine Auction Protocol - On The Power Of Anonymous Broadcast
-
Pfitzmann, A, ed, IH, Springer, Heidelberg
-
Stajano, F., Anderson, R.: The Cocaine Auction Protocol - On The Power Of Anonymous Broadcast. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, Springer, Heidelberg (2000)
-
(1999)
LNCS
, vol.1768
-
-
Stajano, F.1
Anderson, R.2
-
11
-
-
84947251443
-
The Resurrecting Duckling -Security issues for Ad-Hoc Wireless Networks
-
Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols, Springer, Heidelberg
-
Stajano, F., Anderson, R.: The Resurrecting Duckling -Security issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
-
-
Stajano, F.1
Anderson, R.2
-
12
-
-
33745715767
-
Using cameraphones to interact with context-aware mobile services
-
Tech. Rep. UCAM-CL-TR-609, University of Cambridge Computer Laboratory December
-
Toye, E., Madhavapeddy, A., Sharp, R., Scott, D., Blackwell, A.: Using cameraphones to interact with context-aware mobile services. Tech. Rep. UCAM-CL-TR-609, University of Cambridge Computer Laboratory (December 2004)
-
(2004)
-
-
Toye, E.1
Madhavapeddy, A.2
Sharp, R.3
Scott, D.4
Blackwell, A.5
|