-
2
-
-
35248872559
-
Validating and Securing Spontaneous Associations between Wireless Devices
-
Oct
-
T. Kindberg and K. Zhang, "Validating and Securing Spontaneous Associations between Wireless Devices," Proc. Information Security Conf. (ISC '03), pp. 44-53, Oct. 2003.
-
(2003)
Proc. Information Security Conf. (ISC '03)
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
3
-
-
23944521144
-
Manual Authentication for Wireless Devices
-
C. Gehrmann, C.J. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," RSA Cryptobytes, vol. 7, no. 1, pp. 29-37, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
4
-
-
7644232973
-
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing
-
Nov
-
F. Stajano, "Security for Whom?: The Shifting Security Assumptions of Pervasive Computing," Proc. Int'l Symp. System Synthesis (ISSS '02), pp. 16-27, Nov. 2002.
-
(2002)
Proc. Int'l Symp. System Synthesis (ISSS '02)
, pp. 16-27
-
-
Stajano, F.1
-
5
-
-
84937431479
-
The Personal Server: Changing the Way We Think about Ubiquitous Computing
-
Sept
-
R. Want, T. Pering, G. Danneels, M. Kumar, M. Sundar, and J. Light, "The Personal Server: Changing the Way We Think about Ubiquitous Computing," Proc. Int'l Conf Ubiquitous Computing (UbiComp '02), pp. 194-209, Sept. 2002.
-
(2002)
Proc. Int'l Conf Ubiquitous Computing (UbiComp '02)
, pp. 194-209
-
-
Want, R.1
Pering, T.2
Danneels, G.3
Kumar, M.4
Sundar, M.5
Light, J.6
-
7
-
-
31344438973
-
Key Agreement in Peerto-Peer Wireless Networks
-
M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Key Agreement in Peerto-Peer Wireless Networks," Proc. IEEE, special issue on cryptography and security, vol. 94, pp. 467-478, 2006.
-
(2006)
Proc. IEEE
, vol.94
, pp. 467-478
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
9
-
-
33751023773
-
Secure Device Pairing Based on a Visual Channel,
-
Report 2006/050, Cryptology ePrint Archive, 2006
-
N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan, "Secure Device Pairing Based on a Visual Channel," Report 2006/050, Cryptology ePrint Archive, 2006.
-
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
10
-
-
56649111524
-
Simple and Effective Defense against Evil Twin Access Points
-
Mar
-
V. Roth, W. Polak, E. Rieffel, and T. Turner, "Simple and Effective Defense against Evil Twin Access Points," Proc. ACM Conf. Wireless Network Security (WiSec '08), pp. 220-235, Mar. 2008.
-
(2008)
Proc. ACM Conf. Wireless Network Security (WiSec '08)
, pp. 220-235
-
-
Roth, V.1
Polak, W.2
Rieffel, E.3
Turner, T.4
-
11
-
-
33947635594
-
Loud and Clear: Human Verifiable Authentication Based on Audio
-
July
-
M.T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human Verifiable Authentication Based on Audio," Proc. Int'l Conf. Distributed Computing Systems (ICDCS '06), p. 10, July 2006.
-
(2006)
Proc. Int'l Conf. Distributed Computing Systems (ICDCS '06)
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
12
-
-
65449173388
-
BEDA: Button-Enabled Device Pairing
-
Sept
-
C. Soriente, G. Tsudik, and E. Uzun, "BEDA: Button-Enabled Device Pairing," Proc. Int'l Workshop Security for Spontaneous Interaction (IWSSI 2007), pp. 443-449, Sept. 2007.
-
(2007)
Proc. Int'l Workshop Security for Spontaneous Interaction (IWSSI 2007)
, pp. 443-449
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
13
-
-
20344391422
-
A Gesture-Based Authentication Scheme for Untrusted Public Terminals
-
Oct
-
S.N. Patel, J.S. Pierce, and G.D. Abowd, "A Gesture-Based Authentication Scheme for Untrusted Public Terminals," Proc. ACM Symp. User Interface Software and Technology (UIST '04), pp. 157-160, Oct. 2004.
-
(2004)
Proc. ACM Symp. User Interface Software and Technology (UIST '04)
, pp. 157-160
-
-
Patel, S.N.1
Pierce, J.S.2
Abowd, G.D.3
-
14
-
-
33751044073
-
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
-
Feb
-
D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proc. Network and Distributed Systems Security Symp. (NDSS '02), Feb. 2002.
-
(2002)
Proc. Network and Distributed Systems Security Symp. (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
15
-
-
85084163516
-
Network-in-a-Box: How to Set up a Secure Wireless Network in under a Minute
-
Aug
-
D. Balfanz, G. Durfee, R.E. Grinter, D.K. Smetters, and P. Stewart, "Network-in-a-Box: How to Set up a Secure Wireless Network in under a Minute," Proc. 13th USENIX Security Symp. pp. 207-222, Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symp
, pp. 207-222
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetters, D.K.4
Stewart, P.5
-
18
-
-
38149135757
-
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
-
Sept
-
R. Mayrhofer, H. Gellersen, and M. Hazas, "Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction," Proc. Int'l Conf. Ubiquitous Computing (Ubicomp '07), pp. 199-216, Sept. 2007.
-
(2007)
Proc. Int'l Conf. Ubiquitous Computing (Ubicomp '07)
, pp. 199-216
-
-
Mayrhofer, R.1
Gellersen, H.2
Hazas, M.3
-
19
-
-
38349004892
-
Amigo: Proximity-Based Authentication of Mobile Devices
-
Sept
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara, "Amigo: Proximity-Based Authentication of Mobile Devices," Proc. Int'l Conf. Ubiquitous Computing (UbiComp '07), pp. 253-270, Sept. 2007.
-
(2007)
Proc. Int'l Conf. Ubiquitous Computing (UbiComp '07)
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
LaMarca, A.3
de Lara, E.4
-
20
-
-
35248871953
-
SyncTap: An Interaction Technique for Mobile Networking
-
Sept
-
J. Rekimoto, Y. Ayatsuka, and M. Kohno, "SyncTap: An Interaction Technique for Mobile Networking," Proc. Int'l Conf. Mobile Human-Computer Interaction (MOBILE HCl '03), pp. 104-115, Sept. 2003.
-
(2003)
Proc. Int'l Conf. Mobile Human-Computer Interaction (MOBILE HCl '03)
, pp. 104-115
-
-
Rekimoto, J.1
Ayatsuka, Y.2
Kohno, M.3
-
21
-
-
27544489075
-
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
-
J.M. McCune, A. Perrig, and M.K. Reiter, "Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication," Proc. IEEE Symp. Security and Privacy, pp. 110-124, 2005.
-
(2005)
Proc. IEEE Symp. Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
22
-
-
84945588227
-
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
-
Sept
-
L.E. Holmquist, F. Mattern, B. Schiele, P.A., M. Beigl, and H.-W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," Proc. Int'l Conf. Ubiquitous Computing (UbiComp '01, pp. 116-122, Sept. 2001.
-
(2001)
Proc. Int'l Conf. Ubiquitous Computing (UbiComp '01
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Beigl, P.A.M.4
Gellersen, H.-W.5
-
24
-
-
35048881618
-
Are You with Me?-Using Accelerometers to Determine If Two Devices Are Carried by the Same Person
-
J. Lester, B. Hannaford, and G. Borriello, "Are You with Me?-Using Accelerometers to Determine If Two Devices Are Carried by the Same Person," Proc. Pervasive Computing Int'l Conf. (PERVASIVE '04), pp. 33-50, 2004.
-
(2004)
Proc. Pervasive Computing Int'l Conf. (PERVASIVE '04)
, pp. 33-50
-
-
Lester, J.1
Hannaford, B.2
Borriello, G.3
-
25
-
-
38049081059
-
Movement-Based Group Awareness with Wireless Sensor Networks
-
R. Marin-Perianu, M. Marin-Perianu, P. Havinga, and H. Scholten, "Movement-Based Group Awareness with Wireless Sensor Networks," Proc. Pervasive Computing Int'l Conf. (PERVASIVE '07), pp. 298-315, 2007.
-
(2007)
Proc. Pervasive Computing Int'l Conf. (PERVASIVE '07)
, pp. 298-315
-
-
Marin-Perianu, R.1
Marin-Perianu, M.2
Havinga, P.3
Scholten, H.4
-
28
-
-
65349109969
-
The Martini Synch,
-
Technical Report MSR-TR-2007-123, Microsoft Research, Sept
-
D. Kirovski, M. Sinclair, and D. Wilson, "The Martini Synch," Technical Report MSR-TR-2007-123, Microsoft Research, Sept. 2007.
-
(2007)
-
-
Kirovski, D.1
Sinclair, M.2
Wilson, D.3
-
29
-
-
38149059722
-
Key Generation Based on Acceleration Data of Shaking Processes
-
D. Bichler, G. Stromberg, M. Huemer, and M. Low, "Key Generation Based on Acceleration Data of Shaking Processes," Proc. Int'l Conf. Ubiquitous Computing (UbiComp '07), pp. 304-317, 2007.
-
(2007)
Proc. Int'l Conf. Ubiquitous Computing (UbiComp '07)
, pp. 304-317
-
-
Bichler, D.1
Stromberg, G.2
Huemer, M.3
Low, M.4
-
30
-
-
77953853641
-
Proc. Int'l Conf Mobile Systems, Applications, and Services (MobiSys '05)
-
June
-
C. Castelluccia and P. Mutaf, "Shake Them Up! A MovementBased Pairing Protocol for CPU-Constrained Devices," Proc. Int'l Conf Mobile Systems, Applications, and Services (MobiSys '05), pp. 51-64, June 2005.
-
(2005)
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
31
-
-
33745513832
-
Side Channel Issues for Designing Secure Hardware Implementations
-
L. Batina, N. Mentens, and I. Verbauwhede, "Side Channel Issues for Designing Secure Hardware Implementations," Proc. IEEE Online Testing Symp. (IOLTS '05), pp. 118-121, 2005.
-
(2005)
Proc. IEEE Online Testing Symp. (IOLTS '05)
, pp. 118-121
-
-
Batina, L.1
Mentens, N.2
Verbauwhede, I.3
-
33
-
-
0017018484
-
New Directions in Cryptography
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654,1976.
-
(1976)
IEEE Trans. Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
34
-
-
84976825099
-
How to Expose an Eavesdropper
-
R.L. Rivest and A. Shamir, "How to Expose an Eavesdropper," Comm. ACM, vol. 27, no. 4, pp. 393-394,1984.
-
(1984)
Comm. ACM
, vol.27
, Issue.4
, pp. 393-394
-
-
Rivest, R.L.1
Shamir, A.2
-
36
-
-
33744908245
-
Secure Communications Over Insecure Channels Based on Short Authenticated Strings
-
Aug
-
S. Vaudenay, "Secure Communications Over Insecure Channels Based on Short Authenticated Strings," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05). Aug. 2005.
-
(2005)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05)
-
-
Vaudenay, S.1
|