-
2
-
-
27544512701
-
The untrusted computer problem and camera-based authentication
-
M. Burnside, D. Clarke, B. Gassend, T. Kotwal, S. Devadas, and R. Rivest. The untrusted computer problem and camera-based authentication. In Pervasive Computing (Pervasive), 2002.
-
(2002)
Pervasive Computing (Pervasive)
-
-
Burnside, M.1
Clarke, D.2
Gassend, B.3
Kotwal, T.4
Devadas, S.5
Rivest, R.6
-
3
-
-
0038629682
-
Analysis of key-exchange protocols and their use for building secure channels
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT, 2001.
-
(2001)
EUROCRYPT
-
-
Canetti, R.1
Krawczyk, H.2
-
7
-
-
33947635594
-
Loud and Clear: Human-Verifiable Authentication Based on Audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and Clear: Human-Verifiable Authentication Based on Audio. In International Conference on Distributed Computing Systems (ICDCS), 2006.
-
(2006)
International Conference on Distributed Computing Systems (ICDCS)
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
8
-
-
51249099680
-
Efficient mutual data authentication based on short authenticated strings. IACR Cryptology ePrint Archive
-
Report 2005/424
-
S. Laur, N. Asokan, and K. Nyberg. Efficient mutual data authentication based on short authenticated strings. IACR Cryptology ePrint Archive: Report 2005/424, 2005.
-
(2005)
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
13
-
-
56649102476
-
Efficient device pairing using human-comparable synchronized audiovisual patterns
-
to appear
-
R. Prasad and N. Saxena. Efficient device pairing using human-comparable synchronized audiovisual patterns. In Applied Cryptography and Network Security (ACNS), to appear, 2008.
-
(2008)
Applied Cryptography and Network Security (ACNS)
-
-
Prasad, R.1
Saxena, N.2
-
14
-
-
56649111524
-
Simple and effective defenses against evil twin access points
-
V Roth, W Polak, E. Rieffel, and T. Turner. Simple and effective defenses against evil twin access points. In ACM Conference on Wireless Network Security (WiSec), short paper, 2008.
-
(2008)
ACM Conference on Wireless Network Security (WiSec), short paper
-
-
Roth, V.1
Polak, W.2
Rieffel, E.3
Turner, T.4
-
15
-
-
33751023773
-
Secure device pairing based on a visual channel
-
N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In IEEE Symposium on Security and Privacy, short paper, 2006.
-
(2006)
IEEE Symposium on Security and Privacy, short paper
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
18
-
-
57049189232
-
Hapadep: Human asisted pure audio device pairing. Cryptology ePrint Archive
-
Report 2007/093
-
C. Soriente, G. Tsudik, and E. Uzun. Hapadep: Human asisted pure audio device pairing. Cryptology ePrint Archive, Report 2007/093, 2007.
-
(2007)
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
19
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
22
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In International Cryptology Conference (CRYPTO), 2005.
-
(2005)
International Cryptology Conference (CRYPTO)
-
-
Vaudenay, S.1
|