메뉴 건너뛰기




Volumn 8, Issue 6, 2009, Pages 792-806

Shake well before use: Intuitive and secure pairing of mobile devices

Author keywords

Algorithm protocol design and analysis; Authentication; Human centered computing; Mobile applications; Mobile environments; Ubiquitous computing

Indexed keywords

ALGORITHM/PROTOCOL DESIGN AND ANALYSIS; ARBITRARY PATTERNS; CLASSIFICATION ALGORITHMS; CONCRETE METHODS; CRYPTOGRAPHIC KEYS; CRYPTOGRAPHIC PROTOCOLS; FALSE NEGATIVE RATES; HUMAN-CENTERED COMPUTING; KEY EXCHANGES; MOBILE APPLICATIONS; MOBILE ENVIRONMENTS; MOBILE INTERACTIONS; MUTUAL AUTHENTICATIONS; PAIRING METHODS; SENSOR DATUM; UNDERLYING PRINCIPLES; USER STUDIES;

EID: 65349086799     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2009.51     Document Type: Article
Times cited : (196)

References (37)
  • 1
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
    • Apr
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," Proc. Seventh Int'l Workshop Security Protocols, pp. 172-194, Apr. 1999.
    • (1999) Proc. Seventh Int'l Workshop Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 2
    • 35248872559 scopus 로고    scopus 로고
    • Validating and Securing Spontaneous Associations between Wireless Devices
    • Oct
    • T. Kindberg and K. Zhang, "Validating and Securing Spontaneous Associations between Wireless Devices," Proc. Information Security Conf. (ISC '03), pp. 44-53, Oct. 2003.
    • (2003) Proc. Information Security Conf. (ISC '03) , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 3
    • 23944521144 scopus 로고    scopus 로고
    • Manual Authentication for Wireless Devices
    • C. Gehrmann, C.J. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," RSA Cryptobytes, vol. 7, no. 1, pp. 29-37, 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 4
    • 7644232973 scopus 로고    scopus 로고
    • Security for Whom?: The Shifting Security Assumptions of Pervasive Computing
    • Nov
    • F. Stajano, "Security for Whom?: The Shifting Security Assumptions of Pervasive Computing," Proc. Int'l Symp. System Synthesis (ISSS '02), pp. 16-27, Nov. 2002.
    • (2002) Proc. Int'l Symp. System Synthesis (ISSS '02) , pp. 16-27
    • Stajano, F.1
  • 7
    • 31344438973 scopus 로고    scopus 로고
    • Key Agreement in Peerto-Peer Wireless Networks
    • M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Key Agreement in Peerto-Peer Wireless Networks," Proc. IEEE, special issue on cryptography and security, vol. 94, pp. 467-478, 2006.
    • (2006) Proc. IEEE , vol.94 , pp. 467-478
    • Čagalj, M.1    Čapkun, S.2    Hubaux, J.-P.3
  • 9
    • 33751023773 scopus 로고    scopus 로고
    • Secure Device Pairing Based on a Visual Channel,
    • Report 2006/050, Cryptology ePrint Archive, 2006
    • N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan, "Secure Device Pairing Based on a Visual Channel," Report 2006/050, Cryptology ePrint Archive, 2006.
    • Saxena, N.1    Ekberg, J.-E.2    Kostiainen, K.3    Asokan, N.4
  • 18
    • 38149135757 scopus 로고    scopus 로고
    • Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
    • Sept
    • R. Mayrhofer, H. Gellersen, and M. Hazas, "Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction," Proc. Int'l Conf. Ubiquitous Computing (Ubicomp '07), pp. 199-216, Sept. 2007.
    • (2007) Proc. Int'l Conf. Ubiquitous Computing (Ubicomp '07) , pp. 199-216
    • Mayrhofer, R.1    Gellersen, H.2    Hazas, M.3
  • 21
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
    • J.M. McCune, A. Perrig, and M.K. Reiter, "Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication," Proc. IEEE Symp. Security and Privacy, pp. 110-124, 2005.
    • (2005) Proc. IEEE Symp. Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 28
    • 65349109969 scopus 로고    scopus 로고
    • The Martini Synch,
    • Technical Report MSR-TR-2007-123, Microsoft Research, Sept
    • D. Kirovski, M. Sinclair, and D. Wilson, "The Martini Synch," Technical Report MSR-TR-2007-123, Microsoft Research, Sept. 2007.
    • (2007)
    • Kirovski, D.1    Sinclair, M.2    Wilson, D.3
  • 30
    • 77953853641 scopus 로고    scopus 로고
    • Proc. Int'l Conf Mobile Systems, Applications, and Services (MobiSys '05)
    • June
    • C. Castelluccia and P. Mutaf, "Shake Them Up! A MovementBased Pairing Protocol for CPU-Constrained Devices," Proc. Int'l Conf Mobile Systems, Applications, and Services (MobiSys '05), pp. 51-64, June 2005.
    • (2005) , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 33
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. IT-22, no. 6, pp. 644-654,1976.
    • (1976) IEEE Trans. Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 34
    • 84976825099 scopus 로고
    • How to Expose an Eavesdropper
    • R.L. Rivest and A. Shamir, "How to Expose an Eavesdropper," Comm. ACM, vol. 27, no. 4, pp. 393-394,1984.
    • (1984) Comm. ACM , vol.27 , Issue.4 , pp. 393-394
    • Rivest, R.L.1    Shamir, A.2
  • 36
    • 33744908245 scopus 로고    scopus 로고
    • Secure Communications Over Insecure Channels Based on Short Authenticated Strings
    • Aug
    • S. Vaudenay, "Secure Communications Over Insecure Channels Based on Short Authenticated Strings," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05). Aug. 2005.
    • (2005) Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05)
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.