-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P. and Wong, H.C. (2002) 'Talking to strangers: Authentication in ad-hoc wireless networks', Proceedings of the Symposium on Network and Distributed Systems Security (NDSS), pp.23-35.
-
(2002)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS)
, pp. 23-35
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
2
-
-
33645995393
-
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J. and Rutenbar, P. (2005) 'Device-enabled authorization in the Grey system', Information Security: 8th International Conference, ISC 2005, Lecture Notes in Computer Science, 3650, pp.431-445.
-
Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J. and Rutenbar, P. (2005) 'Device-enabled authorization in the Grey system', Information Security: 8th International Conference, ISC 2005, Lecture Notes in Computer Science, Vol. 3650, pp.431-445.
-
-
-
-
3
-
-
4043050062
-
Key-privacy in public-key encryption
-
Bellare, M., Boldyreva, A., Desai, A. and Pointcheval, D. (2001) 'Key-privacy in public-key encryption', Proceedings of Advances in Cryptology (ASIACRYPT), pp.568-584.
-
(2001)
Proceedings of Advances in Cryptology (ASIACRYPT)
, pp. 568-584
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
4
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary atttacks and password file compromise
-
Bellovin, S. and Merrit, M. (1993) 'Augmented encrypted key exchange: A password-based protocol secure against dictionary atttacks and password file compromise', Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp.244-250.
-
(1993)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 244-250
-
-
Bellovin, S.1
Merrit, M.2
-
6
-
-
84937550984
-
Provably secure password authentication and key exchange using Diffie-Hellman
-
Boyko, V., MacKenzie, P. and Patel, S. (2000) 'Provably secure password authentication and key exchange using Diffie-Hellman', Proceedings of Advances in Cryptology (EUROCRYPT), pp.156-171.
-
(2000)
Proceedings of Advances in Cryptology (EUROCRYPT)
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
7
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Čagalj, M., Čapkun, S. and Hubaux, J-P. (2006) 'Key agreement in peer-to-peer wireless networks', Proceedings of the IEEE (Special Issue on Cryptography and Security), Vol. 94, pp.467-478.
-
(2006)
Proceedings of the IEEE (Special Issue on Cryptography and Security)
, vol.94
, pp. 467-478
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
8
-
-
0242527339
-
Mobility helps security in ad hoc networks
-
Čapkun, S., Hubaux, J. and Buttyán, L. (2003) 'Mobility helps security in ad hoc networks', Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.46-56.
-
(2003)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-56
-
-
Čapkun, S.1
Hubaux, J.2
Buttyán, L.3
-
10
-
-
61849155031
-
-
Dierks, T. and Rescorla, E, 2006 The Transport Layer Security (TLS) Protocol: Version 1.1, RFC 4346
-
Dierks, T. and Rescorla, E. (2006) The Transport Layer Security (TLS) Protocol: Version 1.1, RFC 4346.
-
-
-
-
14
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. (2006) 'Loud and clear: Human-verifiable authentication based on audio', Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), pp.1-10.
-
(2006)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 1-10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
19
-
-
54949110421
-
Information Technology - Automatic Identification and Data Capture Techniques - Data Matrix Bar Code Symbology Specification, For review,
-
ISO/IEC (2006) IS 16022:: International Organization for Standardization, Geneva, Switzerland
-
ISO/IEC (2006) IS 16022:2006: Information Technology - Automatic Identification and Data Capture Techniques - Data Matrix Bar Code Symbology Specification, For review, International Organization for Standardization, Geneva, Switzerland.
-
(2006)
-
-
-
21
-
-
61849173272
-
-
JSR-257 (2006) JSR-257: Contactless Communication API, Java Community Process.
-
JSR-257 (2006) JSR-257: Contactless Communication API, Java Community Process.
-
-
-
-
26
-
-
61849177317
-
-
1996 PGP Snowflake, Personal communication
-
Levien, R. (1996) PGP Snowflake, Personal communication.
-
-
-
Levien, R.1
-
27
-
-
84937402236
-
Password authenticated key exchange based on RSA
-
MacKenzie, P., Patel, S. and Swaminathan, R. (2000) 'Password authenticated key exchange based on RSA', Proceedings of Advances in Cryptology (ASIACRYPT), pp.599-613.
-
(2000)
Proceedings of Advances in Cryptology (ASIACRYPT)
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
28
-
-
27544470609
-
Using camera-phones to enhance human-computer interaction
-
Madhavapeddy, A., Scott, D., Sharp, R. and Upton, E. (2004) 'Using camera-phones to enhance human-computer interaction', Proceedings of Ubiquitous Computing (Adjunct Proceedings: Demos), pp.1-2.
-
(2004)
Proceedings of Ubiquitous Computing (Adjunct Proceedings: Demos)
, pp. 1-2
-
-
Madhavapeddy, A.1
Scott, D.2
Sharp, R.3
Upton, E.4
-
29
-
-
61849138801
-
Proceedings of the ACM Mobile Computing and Communications Review (MC2R)
-
Madhavapeddy, A., Scott, D., Sharp, R. and Upton, E. (2005) 'Using visual tags to bypass Bluetooth device discovery', Proceedings of the ACM Mobile Computing and Communications Review (MC2R), pp.41-53.
-
(2005)
, pp. 41-53
-
-
Madhavapeddy, A.1
Scott, D.2
Sharp, R.3
Upton, E.4
-
30
-
-
38149015773
-
Seeing-is-Believing: Using Camera Phones for Human-Verifiable Authentication
-
Technical Report CMU-CS-04-174, Carnegie Mellon University, pp
-
McCune, J.M., Perrig, A. and Reiter, M.K. (2004) Seeing-is-Believing: Using Camera Phones for Human-Verifiable Authentication, Technical Report CMU-CS-04-174, Carnegie Mellon University, pp.1-22.
-
(2004)
, pp. 1-22
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
31
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
McCune, J.M., Perrig, A. and Reiter, M.K. (2005) 'Seeing-is-believing: using camera phones for human-verifiable authentication', Proceedings of the IEEE Symposium on Security and Privacy, pp.110-124.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
32
-
-
33750059168
-
Phoolproof phishing prevention
-
Parno, B., Kuo, C. and Perrig, A. (2006). 'Phoolproof phishing prevention', Proceedings of the Financial Cryptography and Data Security 10th International Conference, pp.1-19.
-
(2006)
Proceedings of the Financial Cryptography and Data Security 10th International Conference
, pp. 1-19
-
-
Parno, B.1
Kuo, C.2
Perrig, A.3
-
35
-
-
19944391466
-
Using camera-equipped mobile phones for interacting with real-world objects
-
Rohs, M. and Gfeller, B. (2004) 'Using camera-equipped mobile phones for interacting with real-world objects', Proceedings of Advances in Pervasive Computing, pp.265-271.
-
(2004)
Proceedings of Advances in Pervasive Computing
, pp. 265-271
-
-
Rohs, M.1
Gfeller, B.2
-
36
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Sailer, R., Zhang, X., Jaeger, T. and van Doorn, L. (2004) 'Design and implementation of a TCG-based integrity measurement architecture', Proceedings of the USENIX Security Symposium, pp.223-238.
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
37
-
-
38849103391
-
Measurement and analysis of spyware in a university environment
-
Saroiu, S., Gribble, S.D. and Levy, H.M. (2004). 'Measurement and analysis of spyware in a university environment', Proceedings of the Symposium on Networked Systems Design and Implementation (NSDI), pp.141-153.
-
(2004)
Proceedings of the Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 141-153
-
-
Saroiu, S.1
Gribble, S.D.2
Levy, H.M.3
-
38
-
-
33751023773
-
Secure device pairing based on a visual channel (short paper)
-
Saxena, N., Ekberg, J-E., Kostiainen, K. and Asokan, N. (2006) 'Secure device pairing based on a visual channel (short paper)', Proceedings of the IEEE Symposium on Security and Privacy, pp.306-313.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
40
-
-
54749125032
-
-
Trusted Computing Group , Parts 1-3, Version 1.2, Revision 103
-
Trusted Computing Group (2007) Trusted Platform Module Main Specification, Parts 1-3, Version 1.2, Revision 103.
-
(2007)
Trusted Platform Module Main Specification
-
-
-
42
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology CRYPTO
-
Vaudenay, S. (2005) 'Secure communications over insecure channels based on short authenticated strings', Advances in Cryptology (CRYPTO), Lecture Notes in Computer Science, Vol. 3621.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
-
-
Vaudenay, S.1
|