-
2
-
-
61849103248
-
Wi-fi protected setup specification
-
January
-
Alliance, W. (2007) 'Wi-fi protected setup specification', WiFi Alliance Document, January.
-
(2007)
WiFi Alliance Document
-
-
Alliance, W.1
-
3
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, California, USA
-
Balfanz, D., Smetters, D., Stewart, P. and Wong, H.C. (2002) 'Talking to strangers: Authentication in ad-hoc wireless networks', Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, USA.
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
5
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Cagalj, M., Capkun, S. and Hubaux, J. (2006) 'Key agreement in peer-to-peer wireless networks', Proceedings of the IEEE (Special Issue on Cryptography and Security), pp.467-478.
-
(2006)
Proceedings of the IEEE (Special Issue on Cryptography and Security)
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.3
-
6
-
-
0242527339
-
Mobility helps security in ad hoc networks
-
Capkun, S., Hubaux, J. and Buttyan, L. (2003) 'Mobility helps security in ad hoc networks', Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc 2003), pp.46-56.
-
(2003)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc 2003)
, pp. 46-56
-
-
Capkun, S.1
Hubaux, J.2
Buttyan, L.3
-
7
-
-
0017018484
-
New directions in cryptography
-
IT
-
Diffie, W. and Hellman, M.E. (1976) 'New directions in cryptography', IEEE Transactions on Information Theory, IT Vol. 22, No. 6, pp.644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
3142521758
-
-
New York, NY, USA, ACM Press
-
Ellison, C. and Dohrmann, S. (2003) Public-key Support for Group Collaboration, New York, NY, USA, ACM Press, Vol. 6, pp.547-565.
-
(2003)
Public-key Support for Group Collaboration
, vol.6
, pp. 547-565
-
-
Ellison, C.1
Dohrmann, S.2
-
9
-
-
56649108316
-
Spontaneous networking for secure collaborative applications in an infrastructureless environment
-
December
-
Feeney, L.M., Ahlgren, B., Westerlund, A. and Dunkels, A. (2002) 'Spontaneous networking for secure collaborative applications in an infrastructureless environment', Demonstration session: Int'l Conf. on Pervasive Computing (Pervasive 2002), December.
-
(2002)
Demonstration session: Int'l Conf. on Pervasive Computing (Pervasive 2002)
-
-
Feeney, L.M.1
Ahlgren, B.2
Westerlund, A.3
Dunkels, A.4
-
10
-
-
0003603813
-
-
W.H. Freeman & Co, New York, NY, USA
-
Garey, M.R. and Johnson, D.S. (1990) Computers and Intractability; A Guide to the Theory of NP-Completeness, W.H. Freeman & Co., New York, NY, USA.
-
(1990)
Computers and Intractability; A Guide to the Theory of NP-Completeness
-
-
Garey, M.R.1
Johnson, D.S.2
-
11
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C. and Nyberg, K. (2004) 'Manual authentication for wireless devices', RSA Cryptobytes, Vol. 7, No. 1, p.2937.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 2937
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
12
-
-
24644434353
-
Security in personal area networks
-
Mitchell, C.J, Eds, IEE, London, pp
-
Gehrmann, C. and Nyberg, K. (2004) 'Security in personal area networks', in Mitchell, C.J. (Eds.): Security for Mobility, IEE, London, pp.191-230.
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
13
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal, pp
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. (2006) 'Loud and clear: Human-verifiable authentication based on audio', ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, Lisboa, Portugal, pp.10-17.
-
(2006)
ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, pp. 10-17
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
14
-
-
61849147703
-
-
Group, B.S.I. (2006) Simple Pairing Whitepaper, http:// www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm.
-
Group, B.S.I. (2006) Simple Pairing Whitepaper, http:// www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm.
-
-
-
-
16
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artifacts
-
Springer-Verlag, London, UK, pp
-
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M. and Gellersen, H-W. (2001) 'Smart-its friends: A technique for users to easily establish connections between smart artifacts', UbiComp '01: Proceedings of the 3rd International Conference on Ubiquitous Computing Springer-Verlag, London, UK, pp.116-122.
-
(2001)
UbiComp '01: Proceedings of the 3rd International Conference on Ubiquitous Computing
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
18
-
-
0142156649
-
Secure spontaneous device association
-
Dey, A.K, Schmidt, A. and McCarthy, J.F, Eds, Ubicomp, of, Springer, pp
-
Kindberg, T. and Zhang, K. (2003a) 'Secure spontaneous device association', in Dey, A.K., Schmidt, A. and McCarthy, J.F. (Eds.): Ubicomp, Vol. 2864 of Lecture Notes in Computer Science, Springer, pp.124-131.
-
(2003)
Lecture Notes in Computer Science
, vol.2864
, pp. 124-131
-
-
Kindberg, T.1
Zhang, K.2
-
19
-
-
35248872559
-
-
Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
-
Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, Vol. 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
-
-
-
-
20
-
-
0003777824
-
-
BSc Thesis, MIT Department of Electrical Engineering, Cambridge, MA, USA
-
Kohnfelder, L.M. (1978) Towards a Practical Public-key Cryptosystem BSc Thesis, MIT Department of Electrical Engineering, Cambridge, MA, USA.
-
(1978)
Towards a Practical Public-key Cryptosystem
-
-
Kohnfelder, L.M.1
-
21
-
-
31344471100
-
Man in the middle attacks on bluetooth
-
West Indies, pp
-
Kugler, D. (2003) 'Man in the middle attacks on bluetooth', Financial Cryptography, Lecture Notes in Computer Science, Guadeloupe, French West Indies, pp.149-161.
-
(2003)
Financial Cryptography, Lecture Notes in Computer Science, Guadeloupe, French
, pp. 149-161
-
-
Kugler, D.1
-
22
-
-
84911910826
-
Higher Layer Key Exchange Techniques for Bluetooth Security
-
Amsterdam
-
Larsson, J-O. (2001) Higher Layer Key Exchange Techniques for Bluetooth Security, Open Group Conference, Amsterdam.
-
(2001)
Open Group Conference
-
-
Larsson, J.-O.1
-
23
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
Pointcheval, D, Mu, Y. and Chen, K, Eds, CANS, of, Springer, pp
-
Laur, S., Asokan, N. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', in Pointcheval, D., Mu, Y. and Chen, K. (Eds.): CANS, Vol. 4301 of Lecture Notes in Computer Science, Springer, pp.90-107.
-
(2006)
Lecture Notes in Computer Science
, vol.4301
, pp. 90-107
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
24
-
-
61849117691
-
-
available at
-
Levien, R. (1996) Pgp Snowflake, Source code available at: http:// packages.debian.org/testing/graphics/snowflake.html
-
(1996)
Pgp Snowflake, Source code
-
-
Levien, R.1
-
26
-
-
33947642342
-
Secure Communication Method and Apparatus
-
US Patent Number 5,450,493
-
Maher, D.P. (1995) Secure Communication Method and Apparatus, US Patent Number 5,450,493.
-
(1995)
-
-
Maher, D.P.1
-
27
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
Toronto, Canada, pp
-
Mayrhofer, R. and Gellersen, H. (2007) 'Shake well before use: authentication based on accelerometer data', Proc. Pervasive 2007: 5th International Conference on Pervasive Computing, Toronto, Canada, pp.144-161
-
(2007)
Proc. Pervasive 2007: 5th International Conference on Pervasive Computing
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
28
-
-
38149135757
-
Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction
-
Innsbruck, Austria, pp
-
Mayrhofer, R., Gellersen, H. and Hazas, M. (2007) 'Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction', Ubicomp, Innsbruck, Austria, pp.199-216.
-
(2007)
Ubicomp
, pp. 199-216
-
-
Mayrhofer, R.1
Gellersen, H.2
Hazas, M.3
-
29
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Oakland, CA, USA, pp
-
McCune, J.M., Perrig, A. and Reiter, M.K. (2005) 'Seeing-is-believing: using camera phones for human-verifiable authentication', Proc. S&P 2005: IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp.110-124.
-
(2005)
Proc. S&P 2005: IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
30
-
-
61849134610
-
-
Microsoft (2006) Windows Connect Now-ufd and Windows Vista Specification, version 1.0, http://www.microsoft.com/whdc/Rally/ WCN-UFD Vistaspec.mspx, Microsoft
-
Microsoft (2006) Windows Connect Now-ufd and Windows Vista Specification, version 1.0, http://www.microsoft.com/whdc/Rally/ WCN-UFD Vistaspec.mspx, Microsoft
-
-
-
-
31
-
-
61849101290
-
-
Miller, S., Neuman, C., Schiller, J. and Saltzer, J. (1987) 'Kerberos authentication and authorization system', Project Athena Technical Plan, section E.2.1.
-
Miller, S., Neuman, C., Schiller, J. and Saltzer, J. (1987) 'Kerberos authentication and authorization system', Project Athena Technical Plan, section E.2.1.
-
-
-
-
32
-
-
33745832230
-
SAS-based authenticated key agreement
-
Yung, M, Dodis, Y, Kiayias, A. and Malkin, T, Eds, Public Key Cryptography, Springer, pp
-
Pasini, S. and Vaudenay, S. (2006) 'SAS-based authenticated key agreement', in Yung, M., Dodis, Y., Kiayias, A. and Malkin, T. (Eds.): Public Key Cryptography, Vol. 3958, Lecture Notes in Computer Science, Springer, pp.395-409.
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
35
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Oakland, California, USA, pp
-
Saxena, N., Ekberg, J-E., Kostiainen, K. and Asokan, N. (2006) 'Secure device pairing based on a visual channel', 2006 IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.306-313.
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
36
-
-
61849138099
-
-
Soriente, C., Tsudik, G. and Uzun, E. (2007) 'Hapadep: Human asisted pure audio device pairing', Cryptology ePrint Archive, Report 2007/093.
-
Soriente, C., Tsudik, G. and Uzun, E. (2007) 'Hapadep: Human asisted pure audio device pairing', Cryptology ePrint Archive, Report 2007/093.
-
-
-
-
37
-
-
61849134199
-
-
Specification, W.U, 2006 Association Models Supplement, revision 1.0, In USB Implementers Forum
-
Specification, W.U. (2006) Association Models Supplement, revision 1.0, In USB Implementers Forum, http://www.usb.org/developers/wusb/
-
-
-
-
38
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer, pp
-
Stajano, F. and Anderson, R. (2000) 'The resurrecting duckling: Security issues for ad-hoc wireless networks', Security Protocols: 7th International Workshop, Springer, pp.204-214.
-
(2000)
Security Protocols: 7th International Workshop
, pp. 204-214
-
-
Stajano, F.1
Anderson, R.2
-
41
-
-
61849148607
-
Usability Analysis of Secure Pairing Methods
-
Technical Report NRC-TR-2007-002, Nokia Research Center
-
Uzun, E., Karvonen, K. and Asokan, N. (2007) Usability Analysis of Secure Pairing Methods, Technical Report NRC-TR-2007-002, Nokia Research Center.
-
(2007)
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
42
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology, CRYPTO '05: The 25th Annual International Cryptology Conference, Santa Barbara, California, USA, Springer-Verlag, August, pp
-
Vaudenay, S. (2005) 'Secure communications over insecure channels based on short authenticated strings', Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, Vol. 3621, Lecture Notes in Computer Science, Santa Barbara, California, USA, Springer-Verlag, August, pp.309-326.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
|