메뉴 건너뛰기




Volumn 5308 LNCS, Issue , 2008, Pages 311-327

Automated device pairing for asymmetric pairing scenarios

Author keywords

Distributed protocols; Mobile ad hoc systems; Security

Indexed keywords

VIDEO CAMERAS; WI-FI;

EID: 57049123749     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88625-9_21     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 57049135850 scopus 로고    scopus 로고
    • Balfanz. D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: NDSS (2002)
    • Balfanz. D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: NDSS (2002)
  • 2
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045
    • Canetti, R.1    Krawczyk, H.2
  • 3
    • 79959884874 scopus 로고    scopus 로고
    • Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
    • Cynthia, K., Luk, M., Negi, R., Perrig, A.: Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In: ACM SenSys. (2007)
    • (2007) ACM SenSys
    • Cynthia, K.1    Luk, M.2    Negi, R.3    Perrig, A.4
  • 4
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM CCS (2003)
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 6
    • 33947635594 scopus 로고    scopus 로고
    • Goodrich, M.T., Sirivianos, M., Sous, J., Tsudik, G., Uzun, E.: Loud and Clear: Human-Verifiable Authentication Based on Audio. In: ICDCS (2006)
    • Goodrich, M.T., Sirivianos, M., Sous, J., Tsudik, G., Uzun, E.: Loud and Clear: Human-Verifiable Authentication Based on Audio. In: ICDCS (2006)
  • 7
    • 51249099680 scopus 로고    scopus 로고
    • Efficient mutual data authentication based on short authenticated strings. IACR Cryptology ePrint Archive
    • Report 2005/424
    • Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. IACR Cryptology ePrint Archive: Report 2005/424 (2005)
    • (2005)
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 9
    • 57049134174 scopus 로고    scopus 로고
    • Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, 3958. Springer, Heidelberg (2006)
    • Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958. Springer, Heidelberg (2006)
  • 10
    • 57049122368 scopus 로고    scopus 로고
    • Perrig, A., Song, D.: Hash visualization: a new technique to improve real-world security. In: CrypTEC (1999)
    • Perrig, A., Song, D.: Hash visualization: a new technique to improve real-world security. In: CrypTEC (1999)
  • 12
    • 56649111524 scopus 로고    scopus 로고
    • Roth, V/, Polak, W., Rieffel, E., Turner, T.: Simple and effective defenses against evil twin access points. In: ACM Conference on Wireless Network Security (WiSec), short paper (2008)
    • Roth, V/, Polak, W., Rieffel, E., Turner, T.: Simple and effective defenses against evil twin access points. In: ACM Conference on Wireless Network Security (WiSec), short paper (2008)
  • 16
    • 57049126622 scopus 로고    scopus 로고
    • Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: TRINITY (2003)
    • Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: TRINITY (2003)
  • 18
    • 57049189232 scopus 로고    scopus 로고
    • Hapadep: Human asistedpure audio device pairing. Cryptology ePrint Archive
    • Report 2007/093
    • Soriente, C., Tsudik, G., Uzun, E.: Hapadep: Human asistedpure audio device pairing. Cryptology ePrint Archive, Report 2007/093 (2007)
    • (2007)
    • Soriente, C.1    Tsudik, G.2    Uzun, E.3
  • 19
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop (1999)
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 20
    • 38149072454 scopus 로고    scopus 로고
    • Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: 4tajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572. Springer, Heidelberg (2007)
    • Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: 4tajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572. Springer, Heidelberg (2007)
  • 22
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V ed, CRYPTO 2005, Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V (ed.) CRYPTO 2005. LNCS, vol. 3621. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621
    • Vaudenay, S.1
  • 23
    • 0035680116 scopus 로고    scopus 로고
    • Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and. Pattern Recognition (2001)
    • Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Computer Vision and. Pattern Recognition (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.