-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, California
-
Balfanz, D., Smetters, D., Stewart, P. and Wong, H. (2002) 'Talking to strangers: Authentication in ad-hoc wireless networks', Proc. Network and Distributed Systems Security Symposium, San Diego, California.
-
(2002)
Proc. Network and Distributed Systems Security Symposium
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
2
-
-
84942684067
-
Mobile phones will become the primary personal computing devices
-
Washington, DC, USA, pp
-
Barton, J.J., Zhai, S. and Cousins, S. (2006) 'Mobile phones will become the primary personal computing devices', IEEE Workshop on Mobile Computing Systems and Applications, Washington, DC, USA, pp.3-9.
-
(2006)
IEEE Workshop on Mobile Computing Systems and Applications
, pp. 3-9
-
-
Barton, J.J.1
Zhai, S.2
Cousins, S.3
-
3
-
-
77953853641
-
Shake them up!: A movement-based pairing protocol for cpu-constrained devices
-
Castelluccia, C. and Mutaf, P. (2005) 'Shake them up!: A movement-based pairing protocol for cpu-constrained devices', Proc. MobiSys, pp.51-64.
-
(2005)
Proc. MobiSys
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
6
-
-
0002978642
-
Experiments with a new boosting algorithm
-
Bari, Italy, pp
-
Freund, Y. and Schapire, R. (1996) 'Experiments with a new boosting algorithm', Proc. International Conference on Machine Learning, Bari, Italy, pp. 148-156.
-
(1996)
Proc. International Conference on Machine Learning
, pp. 148-156
-
-
Freund, Y.1
Schapire, R.2
-
7
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal
-
Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. (2006) 'Loud and clear: Human-verifiable authentication based on audio', Proc. IEEE Internation Conference on Distributed Computing Systems, Lisboa, Portugal.
-
(2006)
Proc. IEEE Internation Conference on Distributed Computing Systems
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
8
-
-
11244249378
-
Practical robust localization over large-scale 802.11 wireless networks
-
Philadelphia, PA, pp
-
Haeberlen, A., Flannery, E., Ladd, A.M., Rudys, A., Wallach, D.S. and Kavraki, L.E. (2004) 'Practical robust localization over large-scale 802.11 wireless networks', Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM), Philadelphia, PA, pp.70-84.
-
(2004)
Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 70-84
-
-
Haeberlen, A.1
Flannery, E.2
Ladd, A.M.3
Rudys, A.4
Wallach, D.S.5
Kavraki, L.E.6
-
9
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Atlanta, Georgia, USA, pp
-
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M. and Gellersen, H-W. (2001) 'Smart-its friends: A technique for users to easily establish connections between smart artefacts', Proc. UbiComp Atlanta, Georgia, USA, pp. 116-122.
-
(2001)
Proc. UbiComp
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
10
-
-
0142156649
-
Secure spontaneous device association
-
Seattle, Washington, USA, pp
-
Kindberg, T. and Zhang, K. (2003a) 'Secure spontaneous device association', 5th International Conference on Ubiquitous Computing Seattle, Washington, USA, pp. 124-131.
-
(2003)
5th International Conference on Ubiquitous Computing
, pp. 124-131
-
-
Kindberg, T.1
Zhang, K.2
-
11
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
Bristol, UK, pp
-
Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', Proc. Information Security Conference, Bristol, UK, pp.44-53.
-
(2003)
Proc. Information Security Conference
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
12
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
Toronto, Ontario, Canada, pp
-
Mayrhofer, R. and Gellersen, H. (2007) 'Shake well before use: authentication based on accelerometer data', Fifth International Conference on in Pervasive Computing, Toronto, Ontario, Canada, pp. 144-161.
-
(2007)
Fifth International Conference on in Pervasive Computing
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
13
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Oakland, California, USA, pp
-
McCune, J., Perrig, A. and Reiter, M. (2005)'Seeing-is-believing: Using camera phones for human-verifiable authentication', Proc. IEEE Symposium on Security and Privacy, Oakland, California, USA, pp. 110-124.
-
(2005)
Proc. IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
14
-
-
61849164849
-
-
NFC , Retrieved December, 2006
-
NFC (2006) Near Field Communication (nfc), Retrieved December, 2006, http://www.nfc-forum.org/resources/faqs
-
(2006)
Near Field Communication (nfc)
-
-
-
15
-
-
33745926210
-
Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment
-
Dublin, Ireland, pp
-
Nicholson, A.J., Smith, I.E., Hughes, J. and Noble, B.D. (2006) 'Lokey: leveraging the sms network in decentralized, end-to-end trust establishment', Proc. Pervasive, Dublin, Ireland, pp.202-219.
-
(2006)
Proc. Pervasive
, pp. 202-219
-
-
Nicholson, A.J.1
Smith, I.E.2
Hughes, J.3
Noble, B.D.4
-
16
-
-
84976825099
-
How to expose an eavesdropper
-
Rivest, R.L. and Shamir, A. (1984) 'How to expose an eavesdropper', Commun. ACM, Vol. 27, No. 4, pp.393-394.
-
(1984)
Commun. ACM
, vol.27
, Issue.4
, pp. 393-394
-
-
Rivest, R.L.1
Shamir, A.2
-
17
-
-
33751023773
-
Secure device pairing based on visual channel
-
Berkeley, California, USA, pp
-
Saxena, N., Ekberg, J., Kostiainen, K. and Asokan, N. (2006) 'Secure device pairing based on visual channel', Proc. IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp.306-313.
-
(2006)
Proc. IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.2
Kostiainen, K.3
Asokan, N.4
-
18
-
-
77953838402
-
Cracking the bluetooth pin
-
Seattle, Washington, USA, pp
-
Shaked, Y. and Wool, A. (2005) 'Cracking the bluetooth pin', Proc. Mobisys, Seattle, Washington, USA, pp.39-50.
-
(2005)
Proc. Mobisys
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
19
-
-
33750338747
-
Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments
-
California, USA, pp
-
Smetters, D., Balfanz, D., Durfee, G., Smith, T. and Lee, K. (2006) 'Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments', Proc. 8th International Conference on Ubiquitous Computing, Orange County, California, USA, pp.477-494.
-
(2006)
Proc. 8th International Conference on Ubiquitous Computing, Orange County
, pp. 477-494
-
-
Smetters, D.1
Balfanz, D.2
Durfee, G.3
Smith, T.4
Lee, K.5
-
20
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Cambridge, UK, pp
-
Stajano, F. and Anderson, R.J. (1999) 'The resurrecting duckling: security issues for ad-hoc wireless networks', Proc 7th Security Protocols Workshop, Cambridge, UK, pp. 172-194.
-
(1999)
Proc 7th Security Protocols Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
23
-
-
38349003200
-
Usability Study of Secure Pairing Methods
-
Technical Report 2007-02, Nokia Research Center
-
Uzun, E., Karvonen, K., and Asokan, N. (2007) Usability Study of Secure Pairing Methods. Technical Report 2007-02, Nokia Research Center.
-
(2007)
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
24
-
-
46449105804
-
Enabling secure and spontaneous communication between mobile devices us common radio environment
-
Tucson, Arizona, USA
-
Varshavsky, A., LaMarca, A. and de Lara, E. (2007) 'Enabling secure and spontaneous communication between mobile devices us common radio environment', IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), Tucson, Arizona, USA.
-
(2007)
IEEE Workshop on Mobile Computing Systems and Applications (HotMobile)
-
-
Varshavsky, A.1
LaMarca, A.2
de Lara, E.3
-
25
-
-
0034247206
-
Multiboosting: A technique for combining boosting and wagging
-
Webb, G. (2000) 'Multiboosting: A technique for combining boosting and wagging', Machine Learning, Vol. 40, No. 2, pp.159-196.
-
(2000)
Machine Learning
, vol.40
, Issue.2
, pp. 159-196
-
-
Webb, G.1
|