메뉴 건너뛰기




Volumn 4717 LNCS, Issue , 2007, Pages 253-270

Amigo: Proximity-based authentication of mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMMUNICATION SYSTEMS; COMPUTER HARDWARE; INTRUSION DETECTION; ROBUST CONTROL; USER INTERFACES;

EID: 38349004892     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74853-3_15     Document Type: Conference Paper
Times cited : (133)

References (24)
  • 4
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up, a movement-based pairing protocol for cpu-constrained devices
    • Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: Proc. of MobiSys, pp. 51-64 (2005)
    • (2005) Proc. of MobiSys , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 9
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • Abowd, G.D, Brumitt, B, Shafer, S, eds, Ubicomp 2001: Ubiquitous Computing, Springer, Heidelberg
    • Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2201
    • Holmquist, L.E.1    Mattern, F.2    Schiele, B.3    Alahuhta, P.4    Beigl, M.5    Gellersen, H.W.6
  • 10
    • 0142156649 scopus 로고    scopus 로고
    • Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, 2864, Springer, Heidelberg (2003)
    • Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, Springer, Heidelberg (2003)
  • 11
    • 35248872559 scopus 로고    scopus 로고
    • Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, Springer, Heidelberg (2003)
    • Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, Springer, Heidelberg (2003)
  • 13
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • IEEE Computer Society Press, Los Alamitos
    • McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. of IEEE Symposium on Security and Privacy, pp. 110-124. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) Proc. of IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 14
    • 33745926210 scopus 로고    scopus 로고
    • Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment
    • Fishkin, K.P, Schiele, B, Nixon, P, Quigley, A, eds, PERVASIVE 2006, Springer, Heidelberg
    • Nicholson, A.J., Smith, I.E., Hughes, J., Noble, B.D.: Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3968
    • Nicholson, A.J.1    Smith, I.E.2    Hughes, J.3    Noble, B.D.4
  • 15
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commun. ACM 27(4), 393-394 (1984)
    • (1984) Commun. ACM , vol.27 , Issue.4 , pp. 393-394
    • Rivest, R.L.1    Shamir, A.2
  • 18
    • 33750338747 scopus 로고    scopus 로고
    • Smetters, D., Balfanz, D., Durfee, G., Smith, T., Lee, K.: Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, 4206, Springer, Heidelberg (2006)
    • Smetters, D., Balfanz, D., Durfee, G., Smith, T., Lee, K.: Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, Springer, Heidelberg (2006)
  • 19
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols, Springer, Heidelberg
    • Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1796
    • Stajano, F.1    Anderson, R.J.2
  • 20
    • 0038660205 scopus 로고    scopus 로고
    • Attenuation in Construction Materials (NISTIR 6055), National Technical Information Service
    • No. 3: Electromagnetic Signal, Washington October
    • Stone, W.C.: NIST Construction Automation Program Report No. 3: Electromagnetic Signal Attenuation in Construction Materials (NISTIR 6055), National Technical Information Service, Washington (October 1997)
    • (1997) NIST Construction Automation Program Report
    • Stone, W.C.1
  • 22
    • 38349003200 scopus 로고    scopus 로고
    • Usability study of secure pairing methods
    • Technical Report 2007-02, Nokia Research Center January
    • Uzun, E., Karvonen, K., Asokan, N.: Usability study of secure pairing methods. Technical Report 2007-02, Nokia Research Center (January 2007)
    • (2007)
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 24
    • 0034247206 scopus 로고    scopus 로고
    • Multiboosting: A technique for combining boosting and wagging
    • Webb, G.: Multiboosting: A technique for combining boosting and wagging. Machine Learning, 159-196 (2000)
    • (2000) Machine Learning , vol.159-196
    • Webb, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.