메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 17-26

Secure pairing of interface constrained devices

Author keywords

Human assisted authentication; Man in the middle attacks; MiTM; Secure device pairing

Indexed keywords

INTERFACES (COMPUTER); NETWORK SECURITY;

EID: 61849147296     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023423     Document Type: Article
Times cited : (18)

References (34)
  • 5
    • 3142521758 scopus 로고    scopus 로고
    • Public-key support for group collaboration
    • November, pp
    • Ellison, C. and Dohrmann, S. (2003) 'Public-key support for group collaboration', ACM Trans. Inf. Syst. Secur., Vol. 6, No. 4, November, pp.547-565.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 547-565
    • Ellison, C.1    Dohrmann, S.2
  • 6
    • 56649108316 scopus 로고    scopus 로고
    • Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment
    • Zurich, Switzerland
    • Feeney, L., Ahlgren, B. and Westerlund, A. (2002) 'Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment', International Conference on Pervasive Computing (pervasive 2002), Zurich, Switzerland.
    • (2002) International Conference on Pervasive Computing (pervasive 2002)
    • Feeney, L.1    Ahlgren, B.2    Westerlund, A.3
  • 7
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Spring
    • Gehrmann, C., Mitchell, C. and Nyberg, K. (2004) 'Manual authentication for wireless devices', RSA CryptoBytes, Spring, Vol. 7, No. 1, pp.29-37.
    • (2004) RSA CryptoBytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 10
    • 61849175059 scopus 로고    scopus 로고
    • Group, B.S.I. (2006) Simple Pairing Whitepaper, http://www. bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm
    • Group, B.S.I. (2006) Simple Pairing Whitepaper, http://www. bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm
  • 12
    • 0142156649 scopus 로고    scopus 로고
    • Secure spontaneous device association
    • Dey, A, Schmidt, A. and McCarthy, J, Eds, Ubicomp, of, Springer, pp
    • Kindberg, T. and Zhang, K. (2003a)'Secure spontaneous device association', in Dey, A., Schmidt, A. and McCarthy, J. (Eds.): Ubicomp, Volume 2864 of Lecture Notes in Computer Science, Springer, pp. 124-131.
    • (2003) Lecture Notes in Computer Science , vol.2864 , pp. 124-131
    • Kindberg, T.1    Zhang, K.2
  • 13
    • 35248872559 scopus 로고    scopus 로고
    • Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
    • Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, Volume 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
  • 14
    • 38549142076 scopus 로고    scopus 로고
    • Framework for Comparative Usability of Distributed Applications
    • Technical Report NRC-TR-2007-005, Nokia Research Center
    • Kostiainen, K., Uzun, E., Asokan, N. and Ginzboorg, P. (2007) Framework for Comparative Usability of Distributed Applications, Technical Report NRC-TR-2007-005, Nokia Research Center.
    • (2007)
    • Kostiainen, K.1    Uzun, E.2    Asokan, N.3    Ginzboorg, P.4
  • 15
    • 84907412490 scopus 로고    scopus 로고
    • Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and wi-fi protected setup
    • Scarborough, Trinidad and Tobago
    • Kuo, C., Walker, J. and Perrig, A. (2007) 'Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and wi-fi protected setup', Usable Security Workshop (USEC'07), Scarborough, Trinidad and Tobago.
    • (2007) Usable Security Workshop (USEC'07)
    • Kuo, C.1    Walker, J.2    Perrig, A.3
  • 16
    • 84885941616 scopus 로고    scopus 로고
    • Laur, S. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', The 5th International Conference on Cryptology and Network Security, CANS 2006, 4301 of Lecture Notes in Computer Science, Springer, Suzhou, 8-10 December, pp.90-107, A shortened version of ePrint Report 2005/424.
    • Laur, S. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', The 5th International Conference on Cryptology and Network Security, CANS 2006, Volume 4301 of Lecture Notes in Computer Science, Springer, Suzhou, 8-10 December, pp.90-107, A shortened version of ePrint Report 2005/424.
  • 17
    • 61849117691 scopus 로고    scopus 로고
    • available at
    • Levien, R. (1996) PGP snowflake, Source code available at: http:// packages.debian.org/testing/graphics/snowflake.html
    • (1996) PGP snowflake, Source code
    • Levien, R.1
  • 19
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • Oakland, CA, USA, pp
    • McCune, J., Perrig, A. and Reiter, M. (2005)'Seeing-is-believing: Using camera phones for human-verifiable authentication', 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 110-124.
    • (2005) 2005 IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 21
    • 61849184680 scopus 로고    scopus 로고
    • and Telephone Corporation , Available at
    • Nippon Telegraph and Telephone Corporation (2005) Redtacton Website Available at http://www.redtacton.com
    • (2005) Redtacton Website
    • Telegraph, N.1
  • 22
    • 33745832230 scopus 로고    scopus 로고
    • SAS-based authenticated key agreement
    • Yung, M, Ed, Public Key Cryptography, PKC'06, 9th International Workshop on Theory and Practice in Public Key Cryptography of, Springer-Verlag, New York, USA, pp
    • Pasini, S. and Vaudenay, S. (2006)'SAS-based authenticated key agreement', in Yung, M. (Ed.) Public Key Cryptography - PKC'06, 9th International Workshop on Theory and Practice in Public Key Cryptography Volume 3958 of Lecture Notes in Computer Science, Springer-Verlag, New York, USA, pp.395-409.
    • (2006) Lecture Notes in Computer Science , vol.3958 , pp. 395-409
    • Pasini, S.1    Vaudenay, S.2
  • 25
    • 23144461764 scopus 로고    scopus 로고
    • Shinagawa, M., Ochiai, K., Sakamoto, H. and Asahi, T. (2005) 'Human area networking technology: RedTacton', NTT Tech. Rev., 3, No. 5, pp.41-46.
    • Shinagawa, M., Ochiai, K., Sakamoto, H. and Asahi, T. (2005) 'Human area networking technology: RedTacton', NTT Tech. Rev., Vol. 3, No. 5, pp.41-46.
  • 29
    • 61849121075 scopus 로고    scopus 로고
    • Specification, W.U, 2006 Association Models Supplement, Revision 1.0, USB Implementers Forum
    • Specification, W.U. (2006) Association Models Supplement, Revision 1.0, USB Implementers Forum, http://www.usb.org/developers/wusb/
  • 30
  • 32
    • 61849148607 scopus 로고    scopus 로고
    • Usability analysis of secure pairing methods
    • Technical Report NRC-TR-2007-002, Nokia Research Center
    • Uzun, E., Karvonen, K. and Asokan, N. (2007) Usability analysis of secure pairing methods, Technical Report NRC-TR-2007-002, Nokia Research Center.
    • (2007)
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.