-
2
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. Network and Distributed Systems Security Symposium (2002)
-
(2002)
Proc. Network and Distributed Systems Security Symposium
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
3
-
-
84942684067
-
Mobile phones will become the primary personal computing devices
-
IEEE, Los Alamitos
-
Barton, J.J., Zhai, S., Cousins, S.: Mobile phones will become the primary personal computing devices. In: IEEE Workshop on Mobile Computing Systems and Applications, April 2006, IEEE, Los Alamitos (2006)
-
(2006)
IEEE Workshop on Mobile Computing Systems and Applications, April
-
-
Barton, J.J.1
Zhai, S.2
Cousins, S.3
-
4
-
-
77953853641
-
-
Shake them up, a movement-based pairing protocol for cpu-constrained devices
-
Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: Proc. of MobiSys, pp. 51-64 (2005)
-
(2005)
Proc. of MobiSys
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
8
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
IEEE Computer Society Press, Los Alamitos
-
Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: Proc. of IEEE Internation Conference on Distributed Computing Systems, IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proc. of IEEE Internation Conference on Distributed Computing Systems
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
9
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Abowd, G.D, Brumitt, B, Shafer, S, eds, Ubicomp 2001: Ubiquitous Computing, Springer, Heidelberg
-
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2201
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.W.6
-
10
-
-
0142156649
-
-
Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, 2864, Springer, Heidelberg (2003)
-
Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, Springer, Heidelberg (2003)
-
-
-
-
11
-
-
35248872559
-
-
Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, 2851, Springer, Heidelberg (2003)
-
Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, Springer, Heidelberg (2003)
-
-
-
-
13
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
IEEE Computer Society Press, Los Alamitos
-
McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. of IEEE Symposium on Security and Privacy, pp. 110-124. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proc. of IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
14
-
-
33745926210
-
Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment
-
Fishkin, K.P, Schiele, B, Nixon, P, Quigley, A, eds, PERVASIVE 2006, Springer, Heidelberg
-
Nicholson, A.J., Smith, I.E., Hughes, J., Noble, B.D.: Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3968
-
-
Nicholson, A.J.1
Smith, I.E.2
Hughes, J.3
Noble, B.D.4
-
15
-
-
84976825099
-
How to expose an eavesdropper
-
Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commun. ACM 27(4), 393-394 (1984)
-
(1984)
Commun. ACM
, vol.27
, Issue.4
, pp. 393-394
-
-
Rivest, R.L.1
Shamir, A.2
-
16
-
-
33751023773
-
Secure device pairing based on visual channel
-
IEEE Computer Society Press, Los Alamitos
-
Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on visual channel. In: Proc. of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proc. of IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
Ekberg, J.2
Kostiainen, K.3
Asokan, N.4
-
18
-
-
33750338747
-
-
Smetters, D., Balfanz, D., Durfee, G., Smith, T., Lee, K.: Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, 4206, Springer, Heidelberg (2006)
-
Smetters, D., Balfanz, D., Durfee, G., Smith, T., Lee, K.: Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol. 4206, Springer, Heidelberg (2006)
-
-
-
-
19
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols, Springer, Heidelberg
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol. 1796, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
-
-
Stajano, F.1
Anderson, R.J.2
-
20
-
-
0038660205
-
Attenuation in Construction Materials (NISTIR 6055), National Technical Information Service
-
No. 3: Electromagnetic Signal, Washington October
-
Stone, W.C.: NIST Construction Automation Program Report No. 3: Electromagnetic Signal Attenuation in Construction Materials (NISTIR 6055), National Technical Information Service, Washington (October 1997)
-
(1997)
NIST Construction Automation Program Report
-
-
Stone, W.C.1
-
22
-
-
38349003200
-
Usability study of secure pairing methods
-
Technical Report 2007-02, Nokia Research Center January
-
Uzun, E., Karvonen, K., Asokan, N.: Usability study of secure pairing methods. Technical Report 2007-02, Nokia Research Center (January 2007)
-
(2007)
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
24
-
-
0034247206
-
Multiboosting: A technique for combining boosting and wagging
-
Webb, G.: Multiboosting: A technique for combining boosting and wagging. Machine Learning, 159-196 (2000)
-
(2000)
Machine Learning
, vol.159-196
-
-
Webb, G.1
|