-
2
-
-
33751044073
-
Talking to Strangers: Authentication in Adhoc Wireless Networks
-
The Internet Society
-
D. Balfanz, D. Smetters, P. Stewart, and H. Wong, "Talking to Strangers: Authentication in Adhoc Wireless Networks," in Proceedings of the Network and Distributed System Security Symposium (NDSS '02). The Internet Society, 2002.
-
(2002)
Proceedings of the Network and Distributed System Security Symposium (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
3
-
-
23944521144
-
Manual Authentication for Wireless Devices
-
C. Gehrmann, C. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," RSA Cryptobytes, vol. 7, no. 1, pp. 29-37, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
4
-
-
34247333484
-
The Ephemeral Pairing Problem
-
Financial Cryptography, Springer-Verlag
-
J. H. Hoepman, "The Ephemeral Pairing Problem," in Financial Cryptography, ser. Lecture Notes in Computer Science, LNCS 3110. Springer-Verlag, 2004, pp. 212-226.
-
(2004)
ser. Lecture Notes in Computer Science, LNCS
, vol.3110
, pp. 212-226
-
-
Hoepman, J.H.1
-
5
-
-
24644472550
-
Ephemeral Pairing on Anonymous Networks
-
Proceedings of the 2nd International Conference on Security in Pervasive Computing SPC '05, Springer-Verlag
-
_, "Ephemeral Pairing on Anonymous Networks," in Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC '05), ser. Lecture Notes in Computer Science, LNCS 3450. Springer-Verlag, 2005, pp. 101-116.
-
(2005)
ser. Lecture Notes in Computer Science, LNCS
, vol.3450
, pp. 101-116
-
-
Hoepman, J.H.1
-
6
-
-
84947251443
-
The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
-
Proceedings of the 7th International Workshop on Security Protocols, Springer-Verlag
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks," in Proceedings of the 7th International Workshop on Security Protocols, ser. Lecture Notes in Computer Science, LNCS 1796. Springer-Verlag, 1999, pp. 172-182.
-
(1999)
ser. Lecture Notes in Computer Science, LNCS
, vol.1796
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
10
-
-
24644434353
-
Security in Personal Area Networks
-
IEEE
-
C. Gehrmann and K. Nyberg, "Security in Personal Area Networks," in Security for Mobility. IEEE, 2004, pp. 191-230.
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
11
-
-
33749614144
-
-
D. Singelée and B. Preneel, Improved Pairing Protocol for Bluetooth, in Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06), ser. Lecture Notes in Computer Science, LNCS 4104. Springer-Verlag, 2006, pp. 252-265.
-
D. Singelée and B. Preneel, "Improved Pairing Protocol for Bluetooth," in Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06), ser. Lecture Notes in Computer Science, LNCS 4104. Springer-Verlag, 2006, pp. 252-265.
-
-
-
-
12
-
-
31344438973
-
Key Agreement in Peer-to-Peer Wireless Networks
-
M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," in Proceedings of the IEEE (Special Issue on Security and Cryptography), vol. 94, no. 2, 2006, pp. 467-478.
-
(2006)
Proceedings of the IEEE (Special Issue on Security and Cryptography)
, vol.94
, Issue.2
, pp. 467-478
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
13
-
-
84949953635
-
The Resurrecting Duckling - what next?
-
Proceedings of the 8th International Workshop on Security Protocols, Springer-Verlag
-
F. Stajano, "The Resurrecting Duckling - what next?" in Proceedings of the 8th International Workshop on Security Protocols, ser. Lecture Notes in Computer Science, LNCS 2133. Springer-Verlag, 2001, pp. 204-214.
-
(2001)
ser. Lecture Notes in Computer Science, LNCS
, vol.2133
, pp. 204-214
-
-
Stajano, F.1
-
14
-
-
27544489075
-
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
-
J. McCune, A. Perrig, and M. Reiter, "Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication ," in Proceedings of the IEEE Symposium on Security and Privacy (SP '05), 2005, pp. 110-124.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy (SP '05)
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
15
-
-
33751023773
-
Secure Device Pairing based on a Visual Channel (Short Paper)
-
N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan, "Secure Device Pairing based on a Visual Channel (Short Paper)," in Proceedings of the IEEE Symposium on Security and Privacy (SP '06), 2006, pp. 306-313.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy (SP '06)
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
16
-
-
35248872559
-
Validating and Securing Spontaneous Associations between Wireless Devices
-
Proceedings of the 6th Information Security Conference ISC '03, Springer-Verlag
-
T. Kindberg and K. Zhang, "Validating and Securing Spontaneous Associations between Wireless Devices," in Proceedings of the 6th Information Security Conference (ISC '03), ser. Lecture Notes in Computer Science, LNCS 2851. Springer-Verlag, 2003, pp. 44-53.
-
(2003)
ser. Lecture Notes in Computer Science, LNCS
, vol.2851
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
17
-
-
33947635594
-
Loud And Clear: Human-Verifiable Authentication Based on Audio
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud And Clear: Human-Verifiable Authentication Based on Audio," in Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06), 2006, p. 10.
-
(2006)
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06)
, pp. 10
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
19
-
-
0033872896
-
RADAR: An In-Building RF-based User Location and Tracking System
-
P. Bahl and V. Padmanabhan, "RADAR: An In-Building RF-based User Location and Tracking System," in Proceedings of IEEE INFOCOM '00, vol. 2, 2000, pp. 775-784.
-
(2000)
Proceedings of IEEE INFOCOM '00
, vol.2
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.2
-
21
-
-
84976295016
-
Distance-Bounding Protocols
-
Advances in Cryptology, EUROCRYPT '93, Springer-Verlag
-
S. Brands and D. Chaum, "Distance-Bounding Protocols," in Advances in Cryptology - EUROCRYPT '93, ser. Lecture Notes in Computer Science, LNCS 765. Springer-Verlag, 1994, pp. 344-359.
-
(1994)
ser. Lecture Notes in Computer Science, LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
22
-
-
0013398251
-
Major Security Problems with the " Unforgeable" (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them
-
Y. Desmedt, "Major Security Problems with the " Unforgeable" (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them," in Proceedings of SecuriCom '88, 1988, pp. 15-17.
-
(1988)
Proceedings of SecuriCom '88
, pp. 15-17
-
-
Desmedt, Y.1
-
24
-
-
84876367662
-
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
-
Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks ESAS '06, Springer-Verlag
-
J. Clulow, G. Hancke, M. Kuhn, and T. Moore, "So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks," in Proceedings of the 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS '06), ser. Lecture Notes in Computer Science, LNCS 4357. Springer-Verlag, 2006, pp. 83-97.
-
(2006)
ser. Lecture Notes in Computer Science, LNCS
, vol.4357
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.2
Kuhn, M.3
Moore, T.4
-
25
-
-
4544259841
-
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
-
S. Čapkun, L. Buttyán, and J. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks," in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), 2003, pp. 21-32.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)
, pp. 21-32
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.3
-
26
-
-
38149028509
-
Distance Bounding in Noisy Environments
-
To Appear in the Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks ESAS '07, Springer-Verlag
-
D. Singelée and B. Preneel, "Distance Bounding in Noisy Environments," in To Appear in the Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS '07), ser. Lecture Notes in Computer Science, LNCS 4572. Springer-Verlag, 2007.
-
(2007)
ser. Lecture Notes in Computer Science, LNCS
, vol.4572
-
-
Singelée, D.1
Preneel, B.2
|