-
2
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, California, USA
-
Balfanz, D., Smetters, D., Stewart, P. and Wong, H. (2002) 'Talking to strangers: Authentication in ad-hoc wireless networks', Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, USA.
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
3
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Bellovin, S. and Merritt, M. (1992) 'Encrypted key exchange: password-based protocols secure against dictionary attacks', Research in Security and Privacy, 1992, Proceedings 1992 IEEE Computer Society Symposium on, pp.72-84.
-
(1992)
Research in Security and Privacy, 1992, Proceedings 1992 IEEE Computer Society Symposium on
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
4
-
-
0017018484
-
New directions in cryptography
-
Diffie, W. and Hellman, M.E. (1976) 'New directions in cryptography', IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp.644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
5
-
-
3142521758
-
Public-key support for group collaboration
-
November, pp
-
Ellison, C. and Dohrmann, S. (2003) 'Public-key support for group collaboration', ACM Trans. Inf. Syst. Secur., Vol. 6, No. 4, November, pp.547-565.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 547-565
-
-
Ellison, C.1
Dohrmann, S.2
-
6
-
-
56649108316
-
Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment
-
Zurich, Switzerland
-
Feeney, L., Ahlgren, B. and Westerlund, A. (2002) 'Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment', International Conference on Pervasive Computing (pervasive 2002), Zurich, Switzerland.
-
(2002)
International Conference on Pervasive Computing (pervasive 2002)
-
-
Feeney, L.1
Ahlgren, B.2
Westerlund, A.3
-
7
-
-
23944521144
-
Manual authentication for wireless devices
-
Spring
-
Gehrmann, C., Mitchell, C. and Nyberg, K. (2004) 'Manual authentication for wireless devices', RSA CryptoBytes, Spring, Vol. 7, No. 1, pp.29-37.
-
(2004)
RSA CryptoBytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
9
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal, pp
-
Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. (2006) 'Loud and clear: Human-verifiable authentication based on audio', ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, Lisboa, Portugal, pp.10-17.
-
(2006)
ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, pp. 10-17
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
10
-
-
61849175059
-
-
Group, B.S.I. (2006) Simple Pairing Whitepaper, http://www. bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm
-
Group, B.S.I. (2006) Simple Pairing Whitepaper, http://www. bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm
-
-
-
-
11
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Springer-Verlag, London, UK, pp
-
Holmquist, L., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M. and Gellersen, H. (2001) 'Smart-its friends: A technique for users to easily establish connections between smart artefacts', UbiComp '01: Proceedings of the 3rd International Conference on Ubiquitous Computing Springer-Verlag, London, UK, pp. 116-122.
-
(2001)
UbiComp '01: Proceedings of the 3rd International Conference on Ubiquitous Computing
, pp. 116-122
-
-
Holmquist, L.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.6
-
12
-
-
0142156649
-
Secure spontaneous device association
-
Dey, A, Schmidt, A. and McCarthy, J, Eds, Ubicomp, of, Springer, pp
-
Kindberg, T. and Zhang, K. (2003a)'Secure spontaneous device association', in Dey, A., Schmidt, A. and McCarthy, J. (Eds.): Ubicomp, Volume 2864 of Lecture Notes in Computer Science, Springer, pp. 124-131.
-
(2003)
Lecture Notes in Computer Science
, vol.2864
, pp. 124-131
-
-
Kindberg, T.1
Zhang, K.2
-
13
-
-
35248872559
-
-
Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
-
Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, Volume 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
-
-
-
-
14
-
-
38549142076
-
Framework for Comparative Usability of Distributed Applications
-
Technical Report NRC-TR-2007-005, Nokia Research Center
-
Kostiainen, K., Uzun, E., Asokan, N. and Ginzboorg, P. (2007) Framework for Comparative Usability of Distributed Applications, Technical Report NRC-TR-2007-005, Nokia Research Center.
-
(2007)
-
-
Kostiainen, K.1
Uzun, E.2
Asokan, N.3
Ginzboorg, P.4
-
15
-
-
84907412490
-
Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and wi-fi protected setup
-
Scarborough, Trinidad and Tobago
-
Kuo, C., Walker, J. and Perrig, A. (2007) 'Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and wi-fi protected setup', Usable Security Workshop (USEC'07), Scarborough, Trinidad and Tobago.
-
(2007)
Usable Security Workshop (USEC'07)
-
-
Kuo, C.1
Walker, J.2
Perrig, A.3
-
16
-
-
84885941616
-
-
Laur, S. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', The 5th International Conference on Cryptology and Network Security, CANS 2006, 4301 of Lecture Notes in Computer Science, Springer, Suzhou, 8-10 December, pp.90-107, A shortened version of ePrint Report 2005/424.
-
Laur, S. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', The 5th International Conference on Cryptology and Network Security, CANS 2006, Volume 4301 of Lecture Notes in Computer Science, Springer, Suzhou, 8-10 December, pp.90-107, A shortened version of ePrint Report 2005/424.
-
-
-
-
17
-
-
61849117691
-
-
available at
-
Levien, R. (1996) PGP snowflake, Source code available at: http:// packages.debian.org/testing/graphics/snowflake.html
-
(1996)
PGP snowflake, Source code
-
-
Levien, R.1
-
18
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
Toronto, Canada, pp
-
Mayrhofer, R. and Gellersen, H. (2007) 'Shake well before use: authentication based on accelerometer data', Proc. Pervasive 2007: 5th International Conference on Pervasive Computing, Toronto, Canada, pp. 144-161.
-
(2007)
Proc. Pervasive 2007: 5th International Conference on Pervasive Computing
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
19
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Oakland, CA, USA, pp
-
McCune, J., Perrig, A. and Reiter, M. (2005)'Seeing-is-believing: Using camera phones for human-verifiable authentication', 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 110-124.
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
21
-
-
61849184680
-
-
and Telephone Corporation , Available at
-
Nippon Telegraph and Telephone Corporation (2005) Redtacton Website Available at http://www.redtacton.com
-
(2005)
Redtacton Website
-
-
Telegraph, N.1
-
22
-
-
33745832230
-
SAS-based authenticated key agreement
-
Yung, M, Ed, Public Key Cryptography, PKC'06, 9th International Workshop on Theory and Practice in Public Key Cryptography of, Springer-Verlag, New York, USA, pp
-
Pasini, S. and Vaudenay, S. (2006)'SAS-based authenticated key agreement', in Yung, M. (Ed.) Public Key Cryptography - PKC'06, 9th International Workshop on Theory and Practice in Public Key Cryptography Volume 3958 of Lecture Notes in Computer Science, Springer-Verlag, New York, USA, pp.395-409.
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
24
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Oakland, California, USA, pp
-
Saxena, N., Ekberg, J., Kostiainen, K. and Asokan, N. (2006) 'Secure device pairing based on a visual channel', 2006 IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.306-313.
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.2
Kostiainen, K.3
Asokan, N.4
-
25
-
-
23144461764
-
-
Shinagawa, M., Ochiai, K., Sakamoto, H. and Asahi, T. (2005) 'Human area networking technology: RedTacton', NTT Tech. Rev., 3, No. 5, pp.41-46.
-
Shinagawa, M., Ochiai, K., Sakamoto, H. and Asahi, T. (2005) 'Human area networking technology: RedTacton', NTT Tech. Rev., Vol. 3, No. 5, pp.41-46.
-
-
-
-
27
-
-
65449173388
-
BEDA: Button-enabled device pairing
-
Innsbruck, Austria
-
Soriente, C., Tsudik, G. and Uzun, E. (2007a) 'BEDA: Button-enabled device pairing', International Workshop on Security for Spontaneous Interaction, UbiComp 2007 Workshop Proceedings, Innsbruck, Austria.
-
(2007)
International Workshop on Security for Spontaneous Interaction, UbiComp 2007 Workshop Proceedings
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
28
-
-
57049189232
-
-
Cryptology ePrint Archive, Report 2007/093
-
Soriente, C., Tsudik, G. and Uzun, E. (2007b) HAPADEP: Human Assisted Pure Audio Device Pairing, Cryptology ePrint Archive, Report 2007/093.
-
(2007)
HAPADEP: Human Assisted Pure Audio Device Pairing
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
29
-
-
61849121075
-
-
Specification, W.U, 2006 Association Models Supplement, Revision 1.0, USB Implementers Forum
-
Specification, W.U. (2006) Association Models Supplement, Revision 1.0, USB Implementers Forum, http://www.usb.org/developers/wusb/
-
-
-
-
30
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Cambridge, UK
-
Stajano, F. and Anderson, R. (1999) 'The resurrecting duckling: Security issues for ad-hoc wireless networks', Security Protocols, 7th International Workshop, Cambridge, UK.
-
(1999)
Security Protocols, 7th International Workshop
-
-
Stajano, F.1
Anderson, R.2
-
31
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
Cambridge, UK, pp
-
Suomalainen, J., Valkonen, J., Asokan, N., Stajano, F., Meadows, C., Capkun, S. and Moore, T. (2007) 'Security associations in personal networks: A comparative analysis', Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, pp.43-57.
-
(2007)
Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
Stajano, F.4
Meadows, C.5
Capkun, S.6
Moore, T.7
-
32
-
-
61849148607
-
Usability analysis of secure pairing methods
-
Technical Report NRC-TR-2007-002, Nokia Research Center
-
Uzun, E., Karvonen, K. and Asokan, N. (2007) Usability analysis of secure pairing methods, Technical Report NRC-TR-2007-002, Nokia Research Center.
-
(2007)
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
34
-
-
0029193237
-
Applying electric field sensing to human-computer interfaces
-
Denver, Colorado, USA, pp
-
Zimmerman, T., Smith, J., Paradiso, J., Allport, D. and Gershenfeld, N. (1995) 'Applying electric field sensing to human-computer interfaces', Proceedings of the SIGCHI Conference on Human factors in Computing Systems, Denver, Colorado, USA, pp.280-287.
-
(1995)
Proceedings of the SIGCHI Conference on Human factors in Computing Systems
, pp. 280-287
-
-
Zimmerman, T.1
Smith, J.2
Paradiso, J.3
Allport, D.4
Gershenfeld, N.5
|