-
1
-
-
57049135850
-
-
Balfanz. D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: NDSS (2002)
-
Balfanz. D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: NDSS (2002)
-
-
-
-
2
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
-
-
Canetti, R.1
Krawczyk, H.2
-
3
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
Cynthia, K., Luk, M., Negi, R., Perrig, A.: Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In: ACM SenSys. (2007)
-
(2007)
ACM SenSys
-
-
Cynthia, K.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
4
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM CCS (2003)
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
6
-
-
33947635594
-
-
Goodrich, M.T., Sirivianos, M., Sous, J., Tsudik, G., Uzun, E.: Loud and Clear: Human-Verifiable Authentication Based on Audio. In: ICDCS (2006)
-
Goodrich, M.T., Sirivianos, M., Sous, J., Tsudik, G., Uzun, E.: Loud and Clear: Human-Verifiable Authentication Based on Audio. In: ICDCS (2006)
-
-
-
-
7
-
-
51249099680
-
Efficient mutual data authentication based on short authenticated strings. IACR Cryptology ePrint Archive
-
Report 2005/424
-
Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. IACR Cryptology ePrint Archive: Report 2005/424 (2005)
-
(2005)
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
9
-
-
57049134174
-
-
Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, 3958. Springer, Heidelberg (2006)
-
Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
57049122368
-
-
Perrig, A., Song, D.: Hash visualization: a new technique to improve real-world security. In: CrypTEC (1999)
-
Perrig, A., Song, D.: Hash visualization: a new technique to improve real-world security. In: CrypTEC (1999)
-
-
-
-
12
-
-
56649111524
-
-
Roth, V/, Polak, W., Rieffel, E., Turner, T.: Simple and effective defenses against evil twin access points. In: ACM Conference on Wireless Network Security (WiSec), short paper (2008)
-
Roth, V/, Polak, W., Rieffel, E., Turner, T.: Simple and effective defenses against evil twin access points. In: ACM Conference on Wireless Network Security (WiSec), short paper (2008)
-
-
-
-
14
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Saxena, N., Ekberg, J.-E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel. In: IEEE Symposium on Security and. Privacy (ISP 2006), short paper (2006)
-
(2006)
IEEE Symposium on Security and. Privacy (ISP 2006), short paper
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
15
-
-
65449173248
-
Universal device pairing using an auxiliary device
-
Saxena, N., Uddin, M. B., Voris, J.: Universal device pairing using an auxiliary device. In: Symposium, On Usable Privacy and Security (SOUPS) (2008)
-
(2008)
Symposium, On Usable Privacy and Security (SOUPS)
-
-
Saxena, N.1
Uddin, M.B.2
Voris, J.3
-
16
-
-
57049126622
-
-
Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: TRINITY (2003)
-
Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: TRINITY (2003)
-
-
-
-
18
-
-
57049189232
-
Hapadep: Human asistedpure audio device pairing. Cryptology ePrint Archive
-
Report 2007/093
-
Soriente, C., Tsudik, G., Uzun, E.: Hapadep: Human asistedpure audio device pairing. Cryptology ePrint Archive, Report 2007/093 (2007)
-
(2007)
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
19
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop (1999)
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
20
-
-
38149072454
-
-
Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: 4tajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572. Springer, Heidelberg (2007)
-
Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: 4tajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572. Springer, Heidelberg (2007)
-
-
-
-
22
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V (ed.) CRYPTO 2005. LNCS, vol. 3621. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
-
-
Vaudenay, S.1
-
23
-
-
0035680116
-
-
Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and. Pattern Recognition (2001)
-
Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and. Pattern Recognition (2001)
-
-
-
|