-
4
-
-
38549162370
-
-
Wireless usb specification: Association models supplement, revision 1.0. USB Implementers Forum (2006), http://www.usb.org/developers/wusb/
-
Wireless usb specification: Association models supplement, revision 1.0. USB Implementers Forum (2006), http://www.usb.org/developers/wusb/
-
-
-
-
6
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
Berkeley, CA, USA, pp, USENIX Association
-
Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K., Stewart, P.: Network-in-a-box: how to set up a secure wireless network in under a minute. In: SSYM 2004. Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, pp. 207-222. USENIX Association (2004)
-
(2004)
SSYM 2004. Proceedings of the 13th conference on USENIX Security Symposium
, pp. 207-222
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetters, D.K.4
Stewart, P.5
-
8
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
February
-
Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002) (February 2002)
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
9
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 2937 (2004)
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 2937
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
10
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: ICDCS 2006. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (2006)
-
(2006)
ICDCS 2006. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
12
-
-
27544489075
-
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
-
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. In: 2005 IEEE Symposium on Security and Privacy, pp. 110-124 (2005)
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
13
-
-
38549142076
-
Framework for comparative usability of distributed applications
-
Technical Report NRC-TR-2007-005, Nokia Research Center
-
Kostiainen, K., Uzun, E., Asokan, N., Ginzboorg, P.: Framework for comparative usability of distributed applications. Technical Report NRC-TR-2007-005, Nokia Research Center (2007)
-
(2007)
-
-
Kostiainen, K.1
Uzun, E.2
Asokan, N.3
Ginzboorg, P.4
-
14
-
-
33646674674
-
Designing an evaluation method for security user interfaces: Lessons from studying secure wireless network configuration
-
Kuo, C., Perrig, A., Walker, J.: Designing an evaluation method for security user interfaces: Lessons from studying secure wireless network configuration. interactions 13(3), 28-31 (2006)
-
(2006)
interactions
, vol.13
, Issue.3
, pp. 28-31
-
-
Kuo, C.1
Perrig, A.2
Walker, J.3
-
15
-
-
84885941616
-
-
Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 90-107. Springer, Heidelberg (2006)
-
Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90-107. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
39749093168
-
The magical number seven, plus or minus two: Some limtis on our capacity for processing information
-
Miller, G.A.: The magical number seven, plus or minus two: Some limtis on our capacity for processing information. Psycological Review 63, 81-97 (1956)
-
(1956)
Psycological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
17
-
-
33751023773
-
Secure Device Pairing based on a Visual Channel
-
Saxena, N., Ekberg, J.-E., Kostiainen, K., Asokan, N.: Secure Device Pairing based on a Visual Channel. In: 2006 IEEE Symposium on Security and Privacy (2006)
-
(2006)
2006 IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
20
-
-
38149097247
-
Security associations in personal networks: A comparative analysis
-
Technical Report NRC-TR-2007-004, Nokia Research Center
-
Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. Technical Report NRC-TR-2007-004, Nokia Research Center (2007)
-
(2007)
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
21
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
|