-
1
-
-
56749162267
-
Ensnared on the wireless Web
-
March 16
-
ABDOLLAH, T. Ensnared on the wireless Web. Los Angeles Times, March 16 2007.
-
(2007)
Los Angeles Times
-
-
ABDOLLAH, T.1
-
2
-
-
17644398259
-
Secure object identification: Or: solving the chess grandmaster problem
-
New York, NY, USA, ACM Press, pp
-
ALKASSAR, A., STÜBLE, C., AND SADEGHI, A.-R. Secure object identification: or: solving the chess grandmaster problem. In NSPW '03: Proceedings of the 2003 workshop on New security paradigms (New York, NY, USA, 2003), ACM Press, pp. 77-85.
-
(2003)
NSPW '03: Proceedings of the 2003 workshop on New security paradigms
, pp. 77-85
-
-
ALKASSAR, A.1
STÜBLE, C.2
SADEGHI, A.-R.3
-
3
-
-
56749144583
-
-
BALFANZ, D., SMETTERS, D. K., STEWART, P., AND WONG, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02) (San Diego, CA, February 2002).
-
BALFANZ, D., SMETTERS, D. K., STEWART, P., AND WONG, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02) (San Diego, CA, February 2002).
-
-
-
-
5
-
-
84976295016
-
Distance-bounding protocols
-
Secaucus, NJ, USA, Springer-Verlag New York, Inc, pp
-
BRANDS, S., AND CHAUM, D. Distance-bounding protocols. In EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology (Secaucus, NJ, USA, 1994), Springer-Verlag New York, Inc., pp. 344-359.
-
(1994)
EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology
, pp. 344-359
-
-
BRANDS, S.1
CHAUM, D.2
-
6
-
-
33847247347
-
-
BUSSARD, L., AND ROUDIER, Y. Embedding distance-bounding protocols within intuitive interactions. In Proc. Conference on Security in Pervasive Computing (SPC'03) (Mar. 2003), 2802 of Lecture Notes in Computer Science, Springer Verlag, pp. 143-156.
-
BUSSARD, L., AND ROUDIER, Y. Embedding distance-bounding protocols within intuitive interactions. In Proc. Conference on Security in Pervasive Computing (SPC'03) (Mar. 2003), vol. 2802 of Lecture Notes in Computer Science, Springer Verlag, pp. 143-156.
-
-
-
-
7
-
-
3042520754
-
Public-key support for collaborative groups
-
Gaithersburg, Mayland, USA, Apr., National Institute for Standards and Technology, pp
-
DOHRMANN, S., AND ELLISON, C. Public-key support for collaborative groups. In Proc. 1st Annual PKI Research Workshop (Gaithersburg, Mayland, USA, Apr. 2002), National Institute for Standards and Technology, pp. 139-148.
-
(2002)
Proc. 1st Annual PKI Research Workshop
, pp. 139-148
-
-
DOHRMANN, S.1
ELLISON, C.2
-
8
-
-
56749144581
-
-
online at, January 20 2005
-
FLEISHMAN, G. My evil twin. Published online at http://wifinetnews.com/archives/004718.html, January 20 2005.
-
My evil twin. Published
-
-
FLEISHMAN, G.1
-
9
-
-
23944521144
-
Manual authentication for wireless devices
-
Jan
-
GEHRMANN, C., MITCHELL, C. J., AND NYBERG, K. Manual authentication for wireless devices. RSA Cryptobytes 7, 1 (Jan. 2004), 29-37.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
GEHRMANN, C.1
MITCHELL, C.J.2
NYBERG, K.3
-
10
-
-
33947635594
-
Loud And Clear: Human verifiable authentication based on audio
-
July, IEEE
-
GOODRICH, M. T., SIRIVIANOS, M., SOLIS, J., TSUDIK, G., AND UZUN, E. Loud And Clear: Human verifiable authentication based on audio. In Proc. 26th International Conference on Distributed Computing Systems (July 2006), IEEE.
-
(2006)
Proc. 26th International Conference on Distributed Computing Systems
-
-
GOODRICH, M.T.1
SIRIVIANOS, M.2
SOLIS, J.3
TSUDIK, G.4
UZUN, E.5
-
11
-
-
56749136748
-
-
GROUP, T. S. Airsnarf. Published online at airsnarf.shmoo.com, Apr. 2007. Airsnarf is a simple wireless access point setup utility designed to demonstrate how a rogue access point can steal usernames and passwords from public wireless hotspots.
-
GROUP, T. S. Airsnarf. Published online at airsnarf.shmoo.com, Apr. 2007. Airsnarf is a simple wireless access point setup utility designed to demonstrate how a rogue access point can steal usernames and passwords from public wireless hotspots.
-
-
-
-
12
-
-
1542593817
-
A one-time password system
-
Internet Engineering Task Force, Feb
-
HALLER, N., METZ, C., NESSER, P., AND STRAW, M. A one-time password system. Internet Request for Comments 2289, Internet Engineering Task Force, Feb. 1998.
-
(1998)
Internet Request for Comments
, pp. 2289
-
-
HALLER, N.1
METZ, C.2
NESSER, P.3
STRAW, M.4
-
13
-
-
56749144582
-
-
KUO, C., WALKER, J., AND PERRIG, A. Low-cost manufacturing, usability, and security: An analysis of Bluetooth simple pairing and Wi-Fi protected setup. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
-
KUO, C., WALKER, J., AND PERRIG, A. Low-cost manufacturing, usability, and security: An analysis of Bluetooth simple pairing and Wi-Fi protected setup. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
-
-
-
-
14
-
-
84885941616
-
-
LAUR, S., AND NYBERG, K. Efficient mutual data authentication using manually authenticated strings. In Proc. 5th International Conference on Cryptology and Network Security (Suzhou, China, 2006), no. 4301 in Lecture Notes in Computer Science, Springer Verlag, pp. 90-107.
-
LAUR, S., AND NYBERG, K. Efficient mutual data authentication using manually authenticated strings. In Proc. 5th International Conference on Cryptology and Network Security (Suzhou, China, 2006), no. 4301 in Lecture Notes in Computer Science, Springer Verlag, pp. 90-107.
-
-
-
-
16
-
-
33947642342
-
Secure communication method and apparatus. United states patent 5,450,493, United States Patent and Trademark
-
Office, Sept, Filed Dec. 29, 1993
-
MAHER, D. P. Secure communication method and apparatus. United states patent 5,450,493, United States Patent and Trademark Office, Sept. 1995. Filed Dec. 29, 1993.
-
(1995)
-
-
MAHER, D.P.1
-
17
-
-
27544489075
-
Seeing-Is-Believing: Using camera phones for human-verifiable authentication
-
MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Seeing-Is-Believing: Using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy (2005), pp. 110-124.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
MCCUNE, J.M.1
PERRIG, A.2
REITER, M.K.3
-
18
-
-
56749162264
-
Evil Twin hotspots are a new menace for internet users, warns cranfield university
-
United Kingdom, Jan, Available online at
-
MEADOWS, H. "Evil Twin" hotspots are a new menace for internet users, warns cranfield university. Press release, Cranfield University, Cranfield, Bedfordshire, MK43 0AL, United Kingdom, Jan. 2005. Available online at http://www.cranfield.ac.uk/university/press/2005/14012005.cfm.
-
(2005)
Press release, Cranfield University, Cranfield, Bedfordshire, MK43
-
-
MEADOWS, H.1
-
19
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
MILLER, G. A. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63 (1956), 81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
MILLER, G.A.1
-
20
-
-
56749089257
-
-
ORNAGHI, A., AND VALLERI, M. Ettercap. Available online at ettercap.sourceforge.net,Apr. 2007. Ettercap is a network sniffer with extensive support for Man-in-the-Mddle Attacks.
-
ORNAGHI, A., AND VALLERI, M. Ettercap. Available online at ettercap.sourceforge.net,Apr. 2007. Ettercap is a network sniffer with extensive support for Man-in-the-Mddle Attacks.
-
-
-
-
22
-
-
35248871953
-
-
REKIMOTO, J., AYATSUKA, Y., AND KOHNO, M. SyncTap: An interaction technique for mobile networking. In Human-computer interaction with mobile devices and services (Mobile HCI 2003) (2003), L. Chittaro, Ed., no. 2795 in Lecture Notes in Computer Science, Springer Verlag, pp. 104-115.
-
REKIMOTO, J., AYATSUKA, Y., AND KOHNO, M. SyncTap: An interaction technique for mobile networking. In Human-computer interaction with mobile devices and services (Mobile HCI 2003) (2003), L. Chittaro, Ed., no. 2795 in Lecture Notes in Computer Science, Springer Verlag, pp. 104-115.
-
-
-
-
23
-
-
0034272534
-
Service advertisement and discovery: Enabling universal device cooperation
-
RICHARD, G. G. Service advertisement and discovery: Enabling universal device cooperation. IEEE Internet Computing 4, 5 (2000), 18-26.
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.5
, pp. 18-26
-
-
RICHARD, G.G.1
-
24
-
-
19944423977
-
The protection of information in computer systems
-
July
-
SALTZER, J. H., AND SCHROEDER, M. D. The protection of information in computer systems. Communications of the ACM 17, 7 (July 1974).
-
(1974)
Communications of the ACM
, vol.17
, pp. 7
-
-
SALTZER, J.H.1
SCHROEDER, M.D.2
-
25
-
-
1542317849
-
Secure verification of location claims
-
New York, NY, USA, ACM Press, pp
-
SASTRY, N., SHANKAR, U., AND WAGNER, D. Secure verification of location claims. In Proceedings of the 2003 ACM workshop on Wireless security (WiSe'03) (New York, NY, USA, 2003), ACM Press, pp. 1-10.
-
(2003)
Proceedings of the 2003 ACM workshop on Wireless security (WiSe'03
, pp. 1-10
-
-
SASTRY, N.1
SHANKAR, U.2
WAGNER, D.3
-
26
-
-
33751023773
-
Secure device pairing based on a visual channel
-
May
-
SAXENA, N., EKBERG, J.-E., KOSTIAINEN, K., AND ASOKAN, N. Secure device pairing based on a visual channel. In IEEE Symposium on Security and Privacy (May 2006).
-
(2006)
IEEE Symposium on Security and Privacy
-
-
SAXENA, N.1
EKBERG, J.-E.2
KOSTIAINEN, K.3
ASOKAN, N.4
-
29
-
-
38149097247
-
Security associations in personal networks: A comparative analysis
-
Technical Report NRC-TR-2007-004, Nokia Research Center, Jan
-
SUOMALAINEN, J., VALKONEN, J., AND ASOKAN, N. Security associations in personal networks: A comparative analysis. Technical Report NRC-TR-2007-004, Nokia Research Center, Jan. 2007.
-
(2007)
-
-
SUOMALAINEN, J.1
VALKONEN, J.2
ASOKAN, N.3
-
30
-
-
56749138826
-
Evil Twin
-
VNU Business Publications, November 23, Available online at
-
THOMSON, I. "Evil Twin" Wi-Fi hacks target the rich. VNU Business Publications, November 23 2006. Available online at www.vnunet.com/2169400.
-
(2006)
Wi-Fi hacks target the rich
-
-
THOMSON, I.1
-
31
-
-
56749116530
-
-
UZUN, E., KARVONEN, K., AND ASOKAN, N. Usability analysis of secure pairing methods. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
-
UZUN, E., KARVONEN, K., AND ASOKAN, N. Usability analysis of secure pairing methods. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
-
-
-
-
32
-
-
33745156127
-
-
VAUDENAY, S. Secure communications over insecure channels based on short authenticated strings. In Proc. Advances in Cryptology (CRYPTO) (2005), 3621 of Lecture Notes in Computer Science, Springer Verlag, pp. 309-326.
-
VAUDENAY, S. Secure communications over insecure channels based on short authenticated strings. In Proc. Advances in Cryptology (CRYPTO) (2005), vol. 3621 of Lecture Notes in Computer Science, Springer Verlag, pp. 309-326.
-
-
-
-
33
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Feb
-
ČAGALJ, M., CAPKUN, S., AND HUBAUX, J.-P. Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE 94, 2 (Feb. 2006), 467-478.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
ČAGALJ, M.1
CAPKUN, S.2
HUBAUX, J.-P.3
-
34
-
-
1942455789
-
Neural activity predicts individual differences in visual working memory capacity
-
Apr
-
VOGEL, E. K., AND MACHIZAWA, M. G. Neural activity predicts individual differences in visual working memory capacity. Nature 428 (Apr. 2004), 748-751.
-
(2004)
Nature
, vol.428
, pp. 748-751
-
-
VOGEL, E.K.1
MACHIZAWA, M.G.2
|