-
1
-
-
0002434672
-
Bluetooth: Vision, goals, and architecture
-
Haartsen, J., et al.: Bluetooth: Vision, goals, and architecture. Mobile Computing and Communications Review 2, 38-45 (1998)
-
(1998)
Mobile Computing and Communications Review
, vol.2
, pp. 38-45
-
-
Haartsen, J.1
-
2
-
-
38349073985
-
-
IETF PKIX workgroup. Public-Key Infrastructure X.509
-
IETF PKIX workgroup. Public-Key Infrastructure X.509
-
-
-
-
4
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Abowd, G.D, Brumitt, B, Shafer, S, eds, Ubicomp 2001: Ubiquitous Computing, Springer, Heidelberg
-
Holmquist, L.E., et al.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, pp. 116-122. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2201
, pp. 116-122
-
-
Holmquist, L.E.1
-
5
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., et al.: A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 21(2), 120-126 (1978)
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
-
6
-
-
38349062211
-
-
IETF TLS workgroup. Transport Layer Security
-
IETF TLS workgroup. Transport Layer Security
-
-
-
-
8
-
-
0008321437
-
Standard Specifications for Public Key Cryptography
-
IEEE 1363-2000
-
IEEE 1363-2000: Standard Specifications for Public Key Cryptography.
-
-
-
-
9
-
-
38349050054
-
-
Analog Devices Corp, Available on-line at
-
Analog Devices Corp. ADXL330. Available on-line at http://www.analog.com.
-
, vol.ADXL330
-
-
-
11
-
-
84949226395
-
-
Fluhrer, S., Lucks, S.: Analysis of the EO Encryption System. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, 2259, Springer, Heidelberg (2001)
-
Fluhrer, S., Lucks, S.: Analysis of the EO Encryption System. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, Springer, Heidelberg (2001)
-
-
-
-
12
-
-
35048894912
-
Faster correlation attack on Bluetooth keystream generator EO
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Lu, Y., Vaudenay, S.: Faster correlation attack on Bluetooth keystream generator EO. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 407-425. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 407-425
-
-
Lu, Y.1
Vaudenay, S.2
-
13
-
-
26444610616
-
A linearization attack on the Bluetooth key stream generator
-
available from
-
Armknecht, F.: A linearization attack on the Bluetooth key stream generator. Cryptology ePrint Archive, report 2002/191 (2002) available from http ://eprint.iacr.org/2002/191
-
(2002)
Cryptology ePrint Archive, report
, vol.2002
, Issue.191
-
-
Armknecht, F.1
-
15
-
-
38349076990
-
-
Whitehouse, O.: War nibbling: Bluetooth insecurity. @Stake, research report (2003)
-
Whitehouse, O.: War nibbling: Bluetooth insecurity. @Stake, research report (2003)
-
-
-
-
17
-
-
77953838402
-
Cracking the Bluetooth PIN
-
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. International Conference on Mobile Systems, Applications, and Services, pp. 39-50 (2005)
-
(2005)
International Conference on Mobile Systems, Applications, and Services
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
19
-
-
35048881618
-
Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person
-
Lester, J., et al.: Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person. Pervasive Computing, pp. 33-50 (2004)
-
(2004)
Pervasive Computing
, pp. 33-50
-
-
Lester, J.1
-
20
-
-
20344391422
-
A gesture-based authentication scheme for untrusted public terminals. ACM User
-
Patel, S.N., et al.: A gesture-based authentication scheme for untrusted public terminals. ACM User. Interface Software and Technology, pp. 157-160 (2004)
-
(2004)
Interface Software and Technology
, pp. 157-160
-
-
Patel, S.N.1
-
21
-
-
77953853641
-
-
Castelluccia, C., Mutaf, P.: Shake Them Up!: a movement-based pairing protocol for CPU-constrained devices. MobiSys, 2005 (2005)
-
Castelluccia, C., Mutaf, P.: Shake Them Up!: a movement-based pairing protocol for CPU-constrained devices. MobiSys, 2005 (2005)
-
-
-
-
26
-
-
0038444621
-
Distortion discriminant analysis for audio fingerprinting
-
Burges, C.J., et al.: Distortion discriminant analysis for audio fingerprinting. IEEE Transactions on Speech and Audio Processing 11(3), 165-174 (2003)
-
(2003)
IEEE Transactions on Speech and Audio Processing
, vol.11
, Issue.3
, pp. 165-174
-
-
Burges, C.J.1
-
27
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
30
-
-
38349023043
-
-
Berlekamp, E.R.: Algebraic coding theory, pp. xiv+466. McGraw-Hill Book, New York (1968)
-
Berlekamp, E.R.: Algebraic coding theory, pp. xiv+466. McGraw-Hill Book, New York (1968)
-
-
-
-
31
-
-
38349051815
-
-
MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. I. North-Holland Mathematical Library 16, xv+369 (1977)
-
MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. I. North-Holland Mathematical Library 16, xv+369 (1977)
-
-
-
-
33
-
-
38349068413
-
-
Sparkfun, Inc. Available on-line at
-
Sparkfun, Inc. Available on-line at http://www.sparkfun.com
-
-
-
|