메뉴 건너뛰기




Volumn 5037 LNCS, Issue , 2008, Pages 328-345

Efficient device pairing using "human-comparable" synchronized audiovisual patterns

Author keywords

[No Author keywords available]

Indexed keywords

BLUETOOTH; CELLULAR TELEPHONE SYSTEMS; COMPUTER NETWORKS; CRYPTOGRAPHY; INTERNET; METROPOLITAN AREA NETWORKS; NETWORK PROTOCOLS; NETWORK SECURITY; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SYSTEMS; WIRELESS NETWORKS;

EID: 45749134695     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68914-0_20     Document Type: Conference Paper
Times cited : (43)

References (16)
  • 5
    • 51249099680 scopus 로고    scopus 로고
    • Efficient mutual data authentication based on short authenticated strings. In: IACR Cryptology ePrint Archive
    • Report 2005/424
    • Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: IACR Cryptology ePrint Archive: Report 2005/424 (2005)
    • (2005)
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 7
    • 33745832230 scopus 로고    scopus 로고
    • Pasini, S., Vaudenay, S.: Sas-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 395-409. Springer, Heidelberg (2006)
    • Pasini, S., Vaudenay, S.: Sas-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395-409. Springer, Heidelberg (2006)
  • 12
    • 57049189232 scopus 로고    scopus 로고
    • Hapadep: Human asisted pure audio device pairing. In: IACR Cryptology ePrint Archive
    • Report 2007/093
    • Soriente, C., Tsudik, G., Uzun, E.: Hapadep: Human asisted pure audio device pairing. In: IACR Cryptology ePrint Archive: Report 2007/093 (2007)
    • (2007)
    • Soriente, C.1    Tsudik, G.2    Uzun, E.3
  • 13
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Malcolm, J.A, Christianson, B, Crispo, B, Roe, M, eds, Security Protocols 1999, Springer, Heidelberg
    • Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1796
    • Stajano, F.1    Anderson, R.J.2
  • 15
    • 38549108892 scopus 로고    scopus 로고
    • Usability analysis of secure pairing methods
    • Usable Security USEC, Springer, Heidelberg
    • Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Usable Security (USEC). LNCS, vol. 4886, pp. 307-324. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4886 , pp. 307-324
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 16
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.