-
1
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
ACM, New York, NY, USA, pp
-
Azimi-Sadjadi, B., Kiayias, A., Mercado, A. and Yener, B. (2007) 'Robust key generation from signal envelopes in wireless networks', Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, pp.401-410, http://portal.acm.org/ citation.cfm?id=1315295.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
2
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P. and Wong, H.C. (2002) 'Talking to strangers: Authentication in ad-hoc wireless networks', Proceedings of the Network and Distributed System Security Symposium, http:// www2.parc.com/csl/members/balfanz/publications/loclim.pdf
-
(2002)
Proceedings of the Network and Distributed System Security Symposium
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
3
-
-
33751508709
-
-
Barker, E., Barker, W., Burr, W., Polk, W. and Smid, M. (2006) Recommendation for Key Management - Part 1: General (Revised), http://csrc.nist.gov/CryptoToolkit/kms/SP800-57Part1_6-30-06.pdf
-
(2006)
Recommendation for Key Management - Part 1: General (Revised)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
4
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Bellovin, S.M. and Merritt, M. (1992) 'Encrypted key exchange: password-based protocols secure against dictionary attacks', Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp.72-84, ieeexplore.ieee.org/iel2/412/5566/00213269.pdf.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
61849107634
-
-
Bluetooth Special Interest Group
-
Bluetooth SIG (2007) Bluetooth 2.1 Specifications. Bluetooth Special Interest Group, http://www.bluetooth.com/NR/rdonlyres/ F8E8276A-3898-4EC6-B7DA-E5535258B056/6545/Core_V21_EDR.zip
-
(2007)
Bluetooth 2.1 Specifications
-
-
-
6
-
-
33751031293
-
-
Čagalj, M., Hubaux, J-P., Čapkun, S., Rengaswamy, R., Tsigkogiannis, I. and Srivastava, M. (2006a) 'Integrity (I) codes: message integrity protection and authentication over insecure channels', Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp.280-294, ieeexplore. ieee.org/xpls/abs_all.jsp?arnumber=1624018
-
Čagalj, M., Hubaux, J-P., Čapkun, S., Rengaswamy, R., Tsigkogiannis, I. and Srivastava, M. (2006a) 'Integrity (I) codes: message integrity protection and authentication over insecure channels', Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp.280-294, ieeexplore. ieee.org/xpls/abs_all.jsp?arnumber=1624018
-
-
-
-
7
-
-
31344438973
-
-
Čagalj, M., Čapkun, S. and Hubaux, J-P. (2006b) 'Key agreement in peer-to-peer wireless networks', Proceedings of the IEEE, 94, No. 2, pp.467-478, ieeexplore.ieee.org/xpls/ abs_all.jsp?arnumber=1580514
-
Čagalj, M., Čapkun, S. and Hubaux, J-P. (2006b) 'Key agreement in peer-to-peer wireless networks', Proceedings of the IEEE, Vol. 94, No. 2, pp.467-478, ieeexplore.ieee.org/xpls/ abs_all.jsp?arnumber=1580514
-
-
-
-
8
-
-
0017018484
-
New directions in cryptography
-
Diffie, W. and Hellman, M.E. (1976) 'New directions in cryptography', IEEE Transactions on Information Theory, IT-22, Vol. 22, pp.644-654, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1055638
-
(1976)
IEEE Transactions on Information Theory, IT-22
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
0020720357
-
On the security of public key protocols
-
xpls/abs_all. jsp?arnumber=1056650
-
Dolev, D. and Yao, A.C. (1983) 'On the security of public key protocols', IEEE Transactions on Information Theory, Vol. 29, No. 2, pp.198-208, ieeexplore.ieee.org/xpls/abs_all. jsp?arnumber=1056650.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
10
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C. and Nyberg, K. (2004) 'Manual authentication for wireless devices', RSA Crypto-Bytes, Vol. 7, No. 1, pp.29-37, http://www.rsa.com/rsalabs/cryptobytes/Spring_2004_Cryptobytes.pdf.
-
(2004)
RSA Crypto-Bytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
11
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. (2006) 'Loud and clear: Human-verifiable authentication based on audio', Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, http://ieeexplore.ieee.org/xpls/ abs_all.jsp?arnumber=1648797
-
(2006)
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
12
-
-
38549131714
-
-
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A. and OHare, T. (2007) 'Vulnerabilities in first-generation RFID-enabled credit cards', Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, 4886 of Lecture Notes in Computer Science, Springer-Verlag, Lowlands, Scarborough, Trinidad/ Tobago, pp.2-14, http://prisms.cs.umass.edu/~kevinfu/papers/ RFID-CC-manuscript.pdf
-
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A. and OHare, T. (2007) 'Vulnerabilities in first-generation RFID-enabled credit cards', Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Volume 4886 of Lecture Notes in Computer Science, Springer-Verlag, Lowlands, Scarborough, Trinidad/ Tobago, pp.2-14, http://prisms.cs.umass.edu/~kevinfu/papers/ RFID-CC-manuscript.pdf
-
-
-
-
14
-
-
84907412490
-
Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and Wi-Fi protected setup
-
Kuo, C., Walker, J. and Perrig, A. (2007) 'Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and Wi-Fi protected setup', Proceedings of the Usable Security 2007 Workshop, Lowlands, Scarborough, Trinidad/Tobago, http:// usablesecurity.org/papers/kuo.pdf
-
(2007)
Proceedings of the Usable Security 2007 Workshop, Lowlands, Scarborough, Trinidad/Tobago
-
-
Kuo, C.1
Walker, J.2
Perrig, A.3
-
15
-
-
84911910826
-
Higher layer key exchange techniques for bluetooth security
-
Amsterdam, 24 October
-
Larsson, J-O. (2001) 'Higher layer key exchange techniques for bluetooth security', Open Group Conference, Amsterdam, 24 October.
-
(2001)
Open Group Conference
-
-
Larsson, J.-O.1
-
16
-
-
51249099680
-
-
Cryptology ePrint Archive, Report 2005/424
-
Laur, S., Asokan, N. and Nyberg, K. (2005) Efficient Mutual Data Authentication Using Manually Authenticated Strings, Cryptology ePrint Archive, Report 2005/424, eprint.iacr.org/2005/424.pdf.
-
(2005)
Efficient Mutual Data Authentication Using Manually Authenticated Strings
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
17
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
Pointcheval, D, Ed, The 5th International Conference on Cryptology and Network Security, of, Springer, Suzhou, China, pp
-
Laur, S. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', in Pointcheval, D. (Ed.): The 5th International Conference on Cryptology and Network Security, Volume 4301 of Lecture Notes in Computer Science, Springer, Suzhou, China, pp.90-107, http://www.springerlink.com/content/w152n0455673652k/
-
(2006)
Lecture Notes in Computer Science
, vol.4301
, pp. 90-107
-
-
Laur, S.1
Nyberg, K.2
-
18
-
-
27544489075
-
-
McCune, J.M., Perrig, A. and Reiter, M.K. (2005) 'Seeingis-believing: using camera phones for human-verifiable authentication', Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.110-124, ieeexplore.ieee.org/xpls/abs_alljsp?arnumber=1425062
-
McCune, J.M., Perrig, A. and Reiter, M.K. (2005) 'Seeingis-believing: using camera phones for human-verifiable authentication', Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.110-124, ieeexplore.ieee.org/xpls/abs_alljsp?arnumber=1425062
-
-
-
-
19
-
-
0003508562
-
-
US Department of Commerce
-
National Institute of Standards and Technology (2000) Digital Signature Standard (DSS), US Department of Commerce, http:// csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
-
(2000)
Digital Signature Standard (DSS)
-
-
-
20
-
-
34250788110
-
Protecting domestic power-line communications
-
Newman, R., Gavette, S., Yonge, L. and Anderson, R. (2006) 'Protecting domestic power-line communications', Proceedings of The Second Symposium on Usable Privacy and Security, pp.122-132, http:// portal.acm.org/citation.cfm?id-1143120.1143136
-
(2006)
Proceedings of The Second Symposium on Usable Privacy and Security
, pp. 122-132
-
-
Newman, R.1
Gavette, S.2
Yonge, L.3
Anderson, R.4
-
21
-
-
34548850332
-
-
Newman, R., Yonge, L., Gavette, S. and Anderson, R. (2007) 'HomePlug AV security mechanisms', Proceedings of The International Symposium on Power Line Communications and Its Applications, pp.366-371, ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4231726
-
Newman, R., Yonge, L., Gavette, S. and Anderson, R. (2007) 'HomePlug AV security mechanisms', Proceedings of The International Symposium on Power Line Communications and Its Applications, pp.366-371, ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4231726
-
-
-
-
22
-
-
33745832230
-
SAS-based authenticated key agreement
-
Proceedings of The 9th International Workshop on Theory and Practice in Public Key Cryptography, of, Springer-Verlag, pp
-
Pasini, S. and Vaudenay, S. (2006) 'SAS-based authenticated key agreement', Proceedings of The 9th International Workshop on Theory and Practice in Public Key Cryptography, Volume 3958 of Lecture Notes in Computer Science, Springer-Verlag, pp.395-409, http://www. springerlink.com/content/r42826j7335254q2/
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
23
-
-
33751023773
-
Secure device pairing based on a visual channel (short paper)
-
Saxena, N., Ekberg, J-E., Kostiainen, K. and Asokan, N. (2006) 'Secure device pairing based on a visual channel (short paper)', Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp.306-313, http://ieeexplore.ieee.org/xpl/freeabs_alljsp?arnumber-1624021
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
24
-
-
57049189232
-
-
Technical report, Cryptology ePrint Archive, Report 2007/039
-
Soriente, C., Tsudik, G. and Uzun, E. (2007) HAPADEP: Human Asisted Pure Audio Device Pairing, Technical report, Cryptology ePrint Archive, Report 2007/039, eprint.iacr.org/2007/093.pdf
-
(2007)
HAPADEP: Human Asisted Pure Audio Device Pairing
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
25
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hocwireless networks
-
Proceedings of the 7th International Workshop on Security Protocols, of, Springer-Verlag, pp
-
Stajano, F. and Anderson, R. (1999) 'The resurrecting duckling: Security issues for ad-hocwireless networks', Proceedings of the 7th International Workshop on Security Protocols, Volume 2133 of Lecture Notes in Computer Science, Springer-Verlag, pp. 172-194, http://www. springerlink.com/content/ru2015q381304428/
-
(1999)
Lecture Notes in Computer Science
, vol.2133
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
26
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, of, Springer-Verlag, pp
-
Suomalainen, J., Valkonen, J. and Asokan, N. (2007) 'Security associations in personal networks: A comparative analysis', Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, Volume 4572 of Lecture Notes in Computer Science, Springer-Verlag, pp.43-57, http://www.springerlink.com/content/ dk04356586jg4g00/
-
(2007)
Lecture Notes in Computer Science
, vol.4572
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
29
-
-
61849085553
-
Usability testing for secure device pairing in home networks
-
September, Innsbruck, Austria, pp
-
Valkonen, J., Toivonen, A. and Karvonen, K. (2007) 'Usability testing for secure device pairing in home networks', UbiComp 2007 Workshop Proceedings, September, Innsbruck, Austria, pp.457-462.
-
(2007)
UbiComp 2007 Workshop Proceedings
, pp. 457-462
-
-
Valkonen, J.1
Toivonen, A.2
Karvonen, K.3
-
30
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
Proceedings of the Ninth International Conference on Ubiquitous Computing, of, Springer-Verlag, pp
-
Varshavsky, A., Scannell, A., LaMarca, A. and de Lara, E. (2007) 'Amigo: proximity-based authentication of mobile devices', Proceedings of the Ninth International Conference on Ubiquitous Computing, Volume 4717 of Lecture Notes in Computer Science, Springer-Verlag, pp.253-270, http://www.springerlink.com/content/37v827165x571333/
-
(2007)
Lecture Notes in Computer Science
, vol.4717
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
LaMarca, A.3
de Lara, E.4
-
31
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology, CRYPTO 2005 of, Springer-Verlag, pp
-
Vaudenay, S. (2005) 'Secure communications over insecure channels based on short authenticated strings', Advances in Cryptology - CRYPTO 2005 Volume 3621 of Lecture Notes in Computer Science, Springer-Verlag, pp.309-326, http://www.springerlink.com/content/ 5wak8q5hedk2fe4n/
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
32
-
-
61849171434
-
Alliance
-
Wi-Fi Alliance Document, available at
-
Wi-Fi Alliance (2007) Wi-Fi Protected Setup Specification, Wi-Fi Alliance Document, available at http://www.wi-fi. org/ wifi-protected-setup/
-
Wi-Fi Protected Setup Specification
-
-
-
33
-
-
61849101287
-
-
Zimmermann, P.R. (1996) Pgpfone: Pretty Good Privacy Phone Owner's Manual, version 1.0 beta 5, appendix c. http://web.mit.edu/network/ pgpfone/manual/#PGP000057
-
Zimmermann, P.R. (1996) Pgpfone: Pretty Good Privacy Phone Owner's Manual, version 1.0 beta 5, appendix c. http://web.mit.edu/network/ pgpfone/manual/#PGP000057
-
-
-
|