-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium (NDSS) (2002)
-
(2002)
Network and Distributed System Security Symposium (NDSS)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
4
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: International Conference on Distributed Computing Systems (ICDCS) (2006)
-
(2006)
International Conference on Distributed Computing Systems (ICDCS)
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
5
-
-
51249099680
-
Efficient mutual data authentication based on short authenticated strings. In: IACR Cryptology ePrint Archive
-
Report 2005/424
-
Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: IACR Cryptology ePrint Archive: Report 2005/424 (2005)
-
(2005)
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
7
-
-
33745832230
-
-
Pasini, S., Vaudenay, S.: Sas-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 395-409. Springer, Heidelberg (2006)
-
Pasini, S., Vaudenay, S.: Sas-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395-409. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
56649111524
-
Simple and effective defenses against evil twin access points
-
Roth, V., Polak, W., Rieffel, E., Turner, T.: Simple and effective defenses against evil twin access points. In: ACM Conference on Wireless Network Security (WiSec), short paper (2008)
-
(2008)
ACM Conference on Wireless Network Security (WiSec), short paper
-
-
Roth, V.1
Polak, W.2
Rieffel, E.3
Turner, T.4
-
10
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Saxena, N., Ekberg, J.-E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel. In: IEEE Symposium on Security and Privacy (S&P), short paper (2006)
-
(2006)
IEEE Symposium on Security and Privacy (S&P), short paper
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
12
-
-
57049189232
-
Hapadep: Human asisted pure audio device pairing. In: IACR Cryptology ePrint Archive
-
Report 2007/093
-
Soriente, C., Tsudik, G., Uzun, E.: Hapadep: Human asisted pure audio device pairing. In: IACR Cryptology ePrint Archive: Report 2007/093 (2007)
-
(2007)
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
13
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols 1999, Springer, Heidelberg
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1796
-
-
Stajano, F.1
Anderson, R.J.2
-
15
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Usable Security USEC, Springer, Heidelberg
-
Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Usable Security (USEC). LNCS, vol. 4886, pp. 307-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
16
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
|