메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 43-56

Seeing-Is-Believing: Using camera phones for human-verifiable authentication

Author keywords

2D barcodes; Camera phones; Device pairing; Key establishment; Man in the middle attack; MITM; Wireless networks

Indexed keywords

AUTHENTICATION; AUTOMATION; BAR CODES; NETWORK SECURITY; TELEPHONE SETS; WIRELESS NETWORKS;

EID: 61849133288     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023425     Document Type: Article
Times cited : (60)

References (43)
  • 2
    • 33645995393 scopus 로고    scopus 로고
    • Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J. and Rutenbar, P. (2005) 'Device-enabled authorization in the Grey system', Information Security: 8th International Conference, ISC 2005, Lecture Notes in Computer Science, 3650, pp.431-445.
    • Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J. and Rutenbar, P. (2005) 'Device-enabled authorization in the Grey system', Information Security: 8th International Conference, ISC 2005, Lecture Notes in Computer Science, Vol. 3650, pp.431-445.
  • 4
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary atttacks and password file compromise
    • Bellovin, S. and Merrit, M. (1993) 'Augmented encrypted key exchange: A password-based protocol secure against dictionary atttacks and password file compromise', Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp.244-250.
    • (1993) Proceedings of the ACM Conference on Computer and Communications Security (CCS) , pp. 244-250
    • Bellovin, S.1    Merrit, M.2
  • 10
    • 61849155031 scopus 로고    scopus 로고
    • Dierks, T. and Rescorla, E, 2006 The Transport Layer Security (TLS) Protocol: Version 1.1, RFC 4346
    • Dierks, T. and Rescorla, E. (2006) The Transport Layer Security (TLS) Protocol: Version 1.1, RFC 4346.
  • 19
    • 54949110421 scopus 로고    scopus 로고
    • Information Technology - Automatic Identification and Data Capture Techniques - Data Matrix Bar Code Symbology Specification, For review,
    • ISO/IEC (2006) IS 16022:: International Organization for Standardization, Geneva, Switzerland
    • ISO/IEC (2006) IS 16022:2006: Information Technology - Automatic Identification and Data Capture Techniques - Data Matrix Bar Code Symbology Specification, For review, International Organization for Standardization, Geneva, Switzerland.
    • (2006)
  • 21
    • 61849173272 scopus 로고    scopus 로고
    • JSR-257 (2006) JSR-257: Contactless Communication API, Java Community Process.
    • JSR-257 (2006) JSR-257: Contactless Communication API, Java Community Process.
  • 26
    • 61849177317 scopus 로고    scopus 로고
    • 1996 PGP Snowflake, Personal communication
    • Levien, R. (1996) PGP Snowflake, Personal communication.
    • Levien, R.1
  • 29
    • 61849138801 scopus 로고    scopus 로고
    • Proceedings of the ACM Mobile Computing and Communications Review (MC2R)
    • Madhavapeddy, A., Scott, D., Sharp, R. and Upton, E. (2005) 'Using visual tags to bypass Bluetooth device discovery', Proceedings of the ACM Mobile Computing and Communications Review (MC2R), pp.41-53.
    • (2005) , pp. 41-53
    • Madhavapeddy, A.1    Scott, D.2    Sharp, R.3    Upton, E.4
  • 30
    • 38149015773 scopus 로고    scopus 로고
    • Seeing-is-Believing: Using Camera Phones for Human-Verifiable Authentication
    • Technical Report CMU-CS-04-174, Carnegie Mellon University, pp
    • McCune, J.M., Perrig, A. and Reiter, M.K. (2004) Seeing-is-Believing: Using Camera Phones for Human-Verifiable Authentication, Technical Report CMU-CS-04-174, Carnegie Mellon University, pp.1-22.
    • (2004) , pp. 1-22
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 35
    • 19944391466 scopus 로고    scopus 로고
    • Using camera-equipped mobile phones for interacting with real-world objects
    • Rohs, M. and Gfeller, B. (2004) 'Using camera-equipped mobile phones for interacting with real-world objects', Proceedings of Advances in Pervasive Computing, pp.265-271.
    • (2004) Proceedings of Advances in Pervasive Computing , pp. 265-271
    • Rohs, M.1    Gfeller, B.2
  • 40
    • 54749125032 scopus 로고    scopus 로고
    • Trusted Computing Group , Parts 1-3, Version 1.2, Revision 103
    • Trusted Computing Group (2007) Trusted Platform Module Main Specification, Parts 1-3, Version 1.2, Revision 103.
    • (2007) Trusted Platform Module Main Specification
  • 42
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Advances in Cryptology CRYPTO
    • Vaudenay, S. (2005) 'Secure communications over insecure channels based on short authenticated strings', Advances in Cryptology (CRYPTO), Lecture Notes in Computer Science, Vol. 3621.
    • (2005) Lecture Notes in Computer Science , vol.3621
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.