메뉴 건너뛰기




Volumn 4717 LNCS, Issue , 2007, Pages 199-216

Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; KNOWLEDGE BASED SYSTEMS; MOBILE DEVICES;

EID: 38149135757     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74853-3_12     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 1
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29-37 (2004)
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 2
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Springer, Heidelberg
    • Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. 7th Int. Workshop on Security Protocols, pp. 172-194. Springer, Heidelberg (1999)
    • (1999) Proc. 7th Int. Workshop on Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 3
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • The Internet Society
    • Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. NDSS'02, The Internet Society (2002)
    • (2002) Proc. NDSS'02
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.C.4
  • 4
    • 84961644448 scopus 로고    scopus 로고
    • Context authentication using constrained channels
    • IEEE Computer Society Press, Los Alamitos
    • Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proc. WMCSA 2002, pp. 14-21. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) Proc. WMCSA , pp. 14-21
    • Kindberg, T.1    Zhang, K.2    Shankar, N.3
  • 5
    • 0142156649 scopus 로고    scopus 로고
    • Kindberg, T., Zhang, K.: Secure spontaneous devices association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, 2864, p. 126. Springer, Heidelberg (2003)
    • Kindberg, T., Zhang, K.: Secure spontaneous devices association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, p. 126. Springer, Heidelberg (2003)
  • 6
    • 35248872559 scopus 로고    scopus 로고
    • Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 44-53. Springer, Heidelberg (2003)
    • Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44-53. Springer, Heidelberg (2003)
  • 7
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • IEEE Computer Society Press, Los Alamitos
    • McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. IEEE Symp. on Security and Privacy, pp. 110-124. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) Proc. IEEE Symp. on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 8
    • 33947635594 scopus 로고    scopus 로고
    • Loud and clear: Human verifiable authentication based on audio
    • IEEE Computer Society Press, Los Alamitos
    • Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human verifiable authentication based on audio. In: Proc. ICDCS 2006, p. 10. IEEE Computer Society Press, Los Alamitos (2006)
    • (2006) Proc. ICDCS , pp. 10
    • Goodrich, M.T.1    Sirivianos, M.2    Solis, J.3    Tsudik, G.4    Uzun, E.5
  • 9
    • 84876367662 scopus 로고    scopus 로고
    • Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 83-97. Springer, Heidelberg (2006)
    • Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 83-97. Springer, Heidelberg (2006)
  • 10
    • 47149099103 scopus 로고    scopus 로고
    • A relative positioning system for co-located mobile devices
    • ACM Press, New York
    • Hazas, M., Kray, C., Gellersen, H., Agbota, H., Kortuem, G., Krohn, A.: A relative positioning system for co-located mobile devices. In: Proc. MobiSys 2005, pp. 177-190. ACM Press, New York (2005)
    • (2005) Proc. MobiSys , pp. 177-190
    • Hazas, M.1    Kray, C.2    Gellersen, H.3    Agbota, H.4    Kortuem, G.5    Krohn, A.6
  • 11
    • 33749543681 scopus 로고    scopus 로고
    • Kortuem, G., Kray, C., Gellersen, H.: Sensing and visualizing spatial relations of mobile devices. In: Proc. UIST 2005, pp. 93-102. ACM Press, New York (2005)
    • Kortuem, G., Kray, C., Gellersen, H.: Sensing and visualizing spatial relations of mobile devices. In: Proc. UIST 2005, pp. 93-102. ACM Press, New York (2005)
  • 13
    • 77953838402 scopus 로고    scopus 로고
    • Cracking the Bluetooth PIN
    • ACM Press, New York
    • Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proc. MobiSys 2005, pp. 39-50. ACM Press, New York (2005)
    • (2005) Proc. MobiSys , pp. 39-50
    • Shaked, Y.1    Wool, A.2
  • 15
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commununications of ACM 27(4), 393-394 (1984)
    • (1984) Commununications of ACM , vol.27 , Issue.4 , pp. 393-394
    • Rivest, R.L.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.