-
1
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29-37 (2004)
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
2
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer, Heidelberg
-
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. 7th Int. Workshop on Security Protocols, pp. 172-194. Springer, Heidelberg (1999)
-
(1999)
Proc. 7th Int. Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
3
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
The Internet Society
-
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. NDSS'02, The Internet Society (2002)
-
(2002)
Proc. NDSS'02
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
4
-
-
84961644448
-
Context authentication using constrained channels
-
IEEE Computer Society Press, Los Alamitos
-
Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proc. WMCSA 2002, pp. 14-21. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proc. WMCSA
, pp. 14-21
-
-
Kindberg, T.1
Zhang, K.2
Shankar, N.3
-
5
-
-
0142156649
-
-
Kindberg, T., Zhang, K.: Secure spontaneous devices association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, 2864, p. 126. Springer, Heidelberg (2003)
-
Kindberg, T., Zhang, K.: Secure spontaneous devices association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, p. 126. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
35248872559
-
-
Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, pp. 44-53. Springer, Heidelberg (2003)
-
Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44-53. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
IEEE Computer Society Press, Los Alamitos
-
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. IEEE Symp. on Security and Privacy, pp. 110-124. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proc. IEEE Symp. on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
8
-
-
33947635594
-
Loud and clear: Human verifiable authentication based on audio
-
IEEE Computer Society Press, Los Alamitos
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human verifiable authentication based on audio. In: Proc. ICDCS 2006, p. 10. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proc. ICDCS
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
9
-
-
84876367662
-
-
Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, pp. 83-97. Springer, Heidelberg (2006)
-
Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 83-97. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
47149099103
-
A relative positioning system for co-located mobile devices
-
ACM Press, New York
-
Hazas, M., Kray, C., Gellersen, H., Agbota, H., Kortuem, G., Krohn, A.: A relative positioning system for co-located mobile devices. In: Proc. MobiSys 2005, pp. 177-190. ACM Press, New York (2005)
-
(2005)
Proc. MobiSys
, pp. 177-190
-
-
Hazas, M.1
Kray, C.2
Gellersen, H.3
Agbota, H.4
Kortuem, G.5
Krohn, A.6
-
11
-
-
33749543681
-
-
Kortuem, G., Kray, C., Gellersen, H.: Sensing and visualizing spatial relations of mobile devices. In: Proc. UIST 2005, pp. 93-102. ACM Press, New York (2005)
-
Kortuem, G., Kray, C., Gellersen, H.: Sensing and visualizing spatial relations of mobile devices. In: Proc. UIST 2005, pp. 93-102. ACM Press, New York (2005)
-
-
-
-
13
-
-
77953838402
-
Cracking the Bluetooth PIN
-
ACM Press, New York
-
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proc. MobiSys 2005, pp. 39-50. ACM Press, New York (2005)
-
(2005)
Proc. MobiSys
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
|