메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Caveat emptor: A comparative study of secure device pairing methods

Author keywords

[No Author keywords available]

Indexed keywords

COMPARATIVE EVALUATIONS; COMPARATIVE STUDIES; DEVICE PAIRING; HUMAN ABILITIES; SECURE CHANNELS; SECURE DEVICE PAIRING; SECURITY CONTEXT; TRUST INFRASTRUCTURE; USER INVOLVEMENT;

EID: 70349332824     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2009.4912753     Document Type: Conference Paper
Times cited : (57)

References (31)
  • 1
    • 38149072454 scopus 로고    scopus 로고
    • J. Suomalainen, J. Valkonen, and N. Asokan, Security Associations in Personal Networks: A Comparative Analysis, in Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS), F. Stajano, C. Meadows, S. Capkun. and T. Moore, Eds.. no. 4572, 2007, pp. 43-57.
    • J. Suomalainen, J. Valkonen, and N. Asokan, "Security Associations in Personal Networks: A Comparative Analysis", in Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS), F. Stajano, C. Meadows, S. Capkun. and T. Moore, Eds.. no. 4572, 2007, pp. 43-57.
  • 3
    • 70349359008 scopus 로고    scopus 로고
    • C. Soriente. G. Tsudik, and E. Uzun, BEDA: Button-Enabled Device Association. in International Workshop, on Security for Spontaneous Interaction (IWSSI), UbiComp, Workshop Proceedings, 2007.
    • C. Soriente. G. Tsudik, and E. Uzun, "BEDA: Button-Enabled Device Association." in International Workshop, on Security for Spontaneous Interaction (IWSSI), UbiComp, Workshop Proceedings, 2007.
  • 5
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. J. Mitchell, and K. Nyberg, "Manual authentication for wireless devices", RSA CryptoBytes. vol. 7. no. 1. 2004.
    • (2004) RSA CryptoBytes , vol.7 , Issue.1
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 6
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based short authenticated strings
    • S. Vaudenay, "Secure communications over insecure channels based short authenticated strings", in Advances in Cryptology-CRYPTO. 2005.
    • (2005) Advances in Cryptology-CRYPTO
    • Vaudenay, S.1
  • 7
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • Springer
    • S. Laur and K. Nyberg, "Efficient mutual data authentication using manually authenticated strings", in International Confrence on Cryptology and Network Security (CANS), vol. 4301. Springer, 2006. pp. 90-107.
    • (2006) International Confrence on Cryptology and Network Security (CANS) , vol.4301 , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 9
    • 70349345021 scopus 로고    scopus 로고
    • Extended abstract: Secure desice pairing based on visual channel
    • N. Saxena et al., "Extended abstract: Secure desice pairing based on visual channel", in IEEE Symposium on Security and Privacy, 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Saxena, N.1
  • 11
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson. "The resurrecting duckling: Security issues for ad-hoc wireless networks", in Security Protocols Workshop, 1999.
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 12
    • 85084163516 scopus 로고    scopus 로고
    • Network-in-a-box: How to set up a secure wireless network in under a minute
    • D. Balfanz et al.. "Network-in-a-box: How to set up a secure wireless network in under a minute." in USENIX Security, 2004. pp. 207-222.
    • (2004) USENIX Security , pp. 207-222
    • Balfanz, D.1
  • 20
    • 56649100493 scopus 로고    scopus 로고
    • HAPADEP: Human-assisted pure audio device pairing
    • C. Soriente, G. Tsudik, and E. Uzun, "HAPADEP: human-assisted pure audio device pairing", in Information Security, 2008, pp. 385-400.
    • (2008) Information Security , pp. 385-400
    • Soriente, C.1    Tsudik, G.2    Uzun, E.3
  • 23
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman
    • Springer
    • V. Boyko, P. MacKenzie, and S. Patel, "Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman", in Advances Cryptology-Eurocrypt. Springer, 2000, pp. 156 171.
    • (2000) Advances Cryptology-Eurocrypt , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 24
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous asso ciations between wireless devices
    • T. Kindberg and K. Zhang, "Validating and securing spontaneous asso ciations between wireless devices." in Information Security Conference (ISC), 2003, pp. 44-53.
    • (2003) Information Security Conference (ISC) , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 25
    • 34548146342 scopus 로고    scopus 로고
    • A Human-Verifiable Authentication Protocol Using Visible Laser Light
    • IEEE Computer Society Washington, DC, USA
    • R. Mayrhofer and M. Welch, "A Human-Verifiable Authentication Protocol Using Visible Laser Light", in International Conference on Availability, Reliability and Security (ARES). IEEE Computer Society Washington, DC, USA, 2007, pp. 1143-1148.
    • (2007) International Conference on Availability, Reliability and Security (ARES) , pp. 1143-1148
    • Mayrhofer, R.1    Welch, M.2
  • 26
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • London, UK: Springer-Verlag
    • L. E. Holmquist et al., "Smart-its friends: A technique for users to easily establish connections between smart artefacts", in Ubiquitous Computing (UbiComp). London, UK: Springer-Verlag, 2001, pp. 116-122.
    • (2001) Ubiquitous Computing (UbiComp) , pp. 116-122
    • Holmquist, L.E.1
  • 27
    • 55749083053 scopus 로고    scopus 로고
    • Shake Well Before Use: Authentication Based on Accelerometer Data
    • Springer
    • R. Mayrhofer and H. Gellersen, "Shake Well Before Use: Authentication Based on Accelerometer Data", in Pervasive Computing (PERVASIVE). Springer, 2007.
    • (2007) Pervasive Computing (PERVASIVE)
    • Mayrhofer, R.1    Gellersen, H.2
  • 29
    • 70349345022 scopus 로고    scopus 로고
    • Personal Communication, Mar
    • J. M. McCune, Personal Communication, Mar 2008.
    • (2008)
    • McCune, J.M.1
  • 30
    • 70349349675 scopus 로고    scopus 로고
    • Personal Communication, Mar
    • K. Kostiainen, Personal Communication, Mar 2008.
    • (2008)
    • Kostiainen, K.1
  • 31
    • 0346271799 scopus 로고    scopus 로고
    • Beyond the fise-user assumption: Benefits of increased sample sizes in usability testing
    • L. Faulkner, "Beyond the fise-user assumption: Benefits of increased sample sizes in usability testing", Behavior Research Methods, Instruments, & Computers, vol. 35. no, 3, pp. 379 383, 2003.
    • (2003) Behavior Research Methods, Instruments, & Computers , vol.35 , Issue.3 , pp. 379-383
    • Faulkner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.