-
1
-
-
38149072454
-
-
J. Suomalainen, J. Valkonen, and N. Asokan, Security Associations in Personal Networks: A Comparative Analysis, in Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS), F. Stajano, C. Meadows, S. Capkun. and T. Moore, Eds.. no. 4572, 2007, pp. 43-57.
-
J. Suomalainen, J. Valkonen, and N. Asokan, "Security Associations in Personal Networks: A Comparative Analysis", in Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS), F. Stajano, C. Meadows, S. Capkun. and T. Moore, Eds.. no. 4572, 2007, pp. 43-57.
-
-
-
-
3
-
-
70349359008
-
-
C. Soriente. G. Tsudik, and E. Uzun, BEDA: Button-Enabled Device Association. in International Workshop, on Security for Spontaneous Interaction (IWSSI), UbiComp, Workshop Proceedings, 2007.
-
C. Soriente. G. Tsudik, and E. Uzun, "BEDA: Button-Enabled Device Association." in International Workshop, on Security for Spontaneous Interaction (IWSSI), UbiComp, Workshop Proceedings, 2007.
-
-
-
-
6
-
-
33744908245
-
Secure communications over insecure channels based short authenticated strings
-
S. Vaudenay, "Secure communications over insecure channels based short authenticated strings", in Advances in Cryptology-CRYPTO. 2005.
-
(2005)
Advances in Cryptology-CRYPTO
-
-
Vaudenay, S.1
-
9
-
-
70349345021
-
Extended abstract: Secure desice pairing based on visual channel
-
N. Saxena et al., "Extended abstract: Secure desice pairing based on visual channel", in IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
-
11
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson. "The resurrecting duckling: Security issues for ad-hoc wireless networks", in Security Protocols Workshop, 1999.
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
12
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
D. Balfanz et al.. "Network-in-a-box: How to set up a secure wireless network in under a minute." in USENIX Security, 2004. pp. 207-222.
-
(2004)
USENIX Security
, pp. 207-222
-
-
Balfanz, D.1
-
15
-
-
3142521758
-
Public-key support for group laboration
-
C. M. Ellison and S. Dohrmann, "Public-key support for group laboration", ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 4, pp. 547-565, 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.4
, pp. 547-565
-
-
Ellison, C.M.1
Dohrmann, S.2
-
20
-
-
56649100493
-
HAPADEP: Human-assisted pure audio device pairing
-
C. Soriente, G. Tsudik, and E. Uzun, "HAPADEP: human-assisted pure audio device pairing", in Information Security, 2008, pp. 385-400.
-
(2008)
Information Security
, pp. 385-400
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
23
-
-
84937550984
-
Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman
-
Springer
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman", in Advances Cryptology-Eurocrypt. Springer, 2000, pp. 156 171.
-
(2000)
Advances Cryptology-Eurocrypt
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
24
-
-
35248872559
-
Validating and securing spontaneous asso ciations between wireless devices
-
T. Kindberg and K. Zhang, "Validating and securing spontaneous asso ciations between wireless devices." in Information Security Conference (ISC), 2003, pp. 44-53.
-
(2003)
Information Security Conference (ISC)
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
25
-
-
34548146342
-
A Human-Verifiable Authentication Protocol Using Visible Laser Light
-
IEEE Computer Society Washington, DC, USA
-
R. Mayrhofer and M. Welch, "A Human-Verifiable Authentication Protocol Using Visible Laser Light", in International Conference on Availability, Reliability and Security (ARES). IEEE Computer Society Washington, DC, USA, 2007, pp. 1143-1148.
-
(2007)
International Conference on Availability, Reliability and Security (ARES)
, pp. 1143-1148
-
-
Mayrhofer, R.1
Welch, M.2
-
26
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
London, UK: Springer-Verlag
-
L. E. Holmquist et al., "Smart-its friends: A technique for users to easily establish connections between smart artefacts", in Ubiquitous Computing (UbiComp). London, UK: Springer-Verlag, 2001, pp. 116-122.
-
(2001)
Ubiquitous Computing (UbiComp)
, pp. 116-122
-
-
Holmquist, L.E.1
-
27
-
-
55749083053
-
Shake Well Before Use: Authentication Based on Accelerometer Data
-
Springer
-
R. Mayrhofer and H. Gellersen, "Shake Well Before Use: Authentication Based on Accelerometer Data", in Pervasive Computing (PERVASIVE). Springer, 2007.
-
(2007)
Pervasive Computing (PERVASIVE)
-
-
Mayrhofer, R.1
Gellersen, H.2
-
29
-
-
70349345022
-
-
Personal Communication, Mar
-
J. M. McCune, Personal Communication, Mar 2008.
-
(2008)
-
-
McCune, J.M.1
-
30
-
-
70349349675
-
-
Personal Communication, Mar
-
K. Kostiainen, Personal Communication, Mar 2008.
-
(2008)
-
-
Kostiainen, K.1
-
31
-
-
0346271799
-
Beyond the fise-user assumption: Benefits of increased sample sizes in usability testing
-
L. Faulkner, "Beyond the fise-user assumption: Benefits of increased sample sizes in usability testing", Behavior Research Methods, Instruments, & Computers, vol. 35. no, 3, pp. 379 383, 2003.
-
(2003)
Behavior Research Methods, Instruments, & Computers
, vol.35
, Issue.3
, pp. 379-383
-
-
Faulkner, L.1
|