메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 4-16

Proximity-based authentication of mobile devices

Author keywords

Mobile devices; Proximity based authentication; Radio authentication; Secure pairing; Security

Indexed keywords

AUTHENTICATION; MOBILE COMPUTING;

EID: 61849163799     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023422     Document Type: Article
Times cited : (31)

References (25)
  • 3
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up!: A movement-based pairing protocol for cpu-constrained devices
    • Castelluccia, C. and Mutaf, P. (2005) 'Shake them up!: A movement-based pairing protocol for cpu-constrained devices', Proc. MobiSys, pp.51-64.
    • (2005) Proc. MobiSys , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 9
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • Atlanta, Georgia, USA, pp
    • Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M. and Gellersen, H-W. (2001) 'Smart-its friends: A technique for users to easily establish connections between smart artefacts', Proc. UbiComp Atlanta, Georgia, USA, pp. 116-122.
    • (2001) Proc. UbiComp , pp. 116-122
    • Holmquist, L.E.1    Mattern, F.2    Schiele, B.3    Alahuhta, P.4    Beigl, M.5    Gellersen, H.-W.6
  • 11
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • Bristol, UK, pp
    • Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', Proc. Information Security Conference, Bristol, UK, pp.44-53.
    • (2003) Proc. Information Security Conference , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 12
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • Toronto, Ontario, Canada, pp
    • Mayrhofer, R. and Gellersen, H. (2007) 'Shake well before use: authentication based on accelerometer data', Fifth International Conference on in Pervasive Computing, Toronto, Ontario, Canada, pp. 144-161.
    • (2007) Fifth International Conference on in Pervasive Computing , pp. 144-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 13
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • Oakland, California, USA, pp
    • McCune, J., Perrig, A. and Reiter, M. (2005)'Seeing-is-believing: Using camera phones for human-verifiable authentication', Proc. IEEE Symposium on Security and Privacy, Oakland, California, USA, pp. 110-124.
    • (2005) Proc. IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 14
    • 61849164849 scopus 로고    scopus 로고
    • NFC , Retrieved December, 2006
    • NFC (2006) Near Field Communication (nfc), Retrieved December, 2006, http://www.nfc-forum.org/resources/faqs
    • (2006) Near Field Communication (nfc)
  • 15
    • 33745926210 scopus 로고    scopus 로고
    • Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment
    • Dublin, Ireland, pp
    • Nicholson, A.J., Smith, I.E., Hughes, J. and Noble, B.D. (2006) 'Lokey: leveraging the sms network in decentralized, end-to-end trust establishment', Proc. Pervasive, Dublin, Ireland, pp.202-219.
    • (2006) Proc. Pervasive , pp. 202-219
    • Nicholson, A.J.1    Smith, I.E.2    Hughes, J.3    Noble, B.D.4
  • 16
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • Rivest, R.L. and Shamir, A. (1984) 'How to expose an eavesdropper', Commun. ACM, Vol. 27, No. 4, pp.393-394.
    • (1984) Commun. ACM , vol.27 , Issue.4 , pp. 393-394
    • Rivest, R.L.1    Shamir, A.2
  • 18
    • 77953838402 scopus 로고    scopus 로고
    • Cracking the bluetooth pin
    • Seattle, Washington, USA, pp
    • Shaked, Y. and Wool, A. (2005) 'Cracking the bluetooth pin', Proc. Mobisys, Seattle, Washington, USA, pp.39-50.
    • (2005) Proc. Mobisys , pp. 39-50
    • Shaked, Y.1    Wool, A.2
  • 20
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Cambridge, UK, pp
    • Stajano, F. and Anderson, R.J. (1999) 'The resurrecting duckling: security issues for ad-hoc wireless networks', Proc 7th Security Protocols Workshop, Cambridge, UK, pp. 172-194.
    • (1999) Proc 7th Security Protocols Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 23
    • 38349003200 scopus 로고    scopus 로고
    • Usability Study of Secure Pairing Methods
    • Technical Report 2007-02, Nokia Research Center
    • Uzun, E., Karvonen, K., and Asokan, N. (2007) Usability Study of Secure Pairing Methods. Technical Report 2007-02, Nokia Research Center.
    • (2007)
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 25
    • 0034247206 scopus 로고    scopus 로고
    • Multiboosting: A technique for combining boosting and wagging
    • Webb, G. (2000) 'Multiboosting: A technique for combining boosting and wagging', Machine Learning, Vol. 40, No. 2, pp.159-196.
    • (2000) Machine Learning , vol.40 , Issue.2 , pp. 159-196
    • Webb, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.