메뉴 건너뛰기




Volumn 5, Issue 6, 2009, Pages 734-749

A comparative study of secure device pairing methods

Author keywords

Device pairing; Human assisted authentication; Key agreement; Man in the middle attacks; Usable security

Indexed keywords

COMPUTER SCIENCE; MOBILE COMPUTING;

EID: 70449686547     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2009.07.008     Document Type: Article
Times cited : (62)

References (37)
  • 1
    • 38149072454 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Stajano F., Meadows C., Capkun S., and Moore T. (Eds)
    • Suomalainen J., Valkonen J., and Asokan N. Security associations in personal networks: A comparative analysis. In: Stajano F., Meadows C., Capkun S., and Moore T. (Eds). Security and Privacy in Ad-hoc and Sensor Networks Workshop, ESAS vol. 4572 (2007) 43-57
    • (2007) Security and Privacy in Ad-hoc and Sensor Networks Workshop, ESAS , vol.4572 , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 7
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Vaudenay S. Secure communications over insecure channels based on short authenticated strings. Advances in Cryptology-CRYPTO (2005)
    • (2005) Advances in Cryptology-CRYPTO
    • Vaudenay, S.1
  • 8
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • Čagalj M., Čapkun S., and Hubaux J.-P. Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE 94 2 (2006) 467-478
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 467-478
    • Čagalj, M.1    Čapkun, S.2    Hubaux, J.-P.3
  • 12
    • 70349345021 scopus 로고    scopus 로고
    • Extended abstract: Secure device pairing based on a visual channel
    • N. Saxena, et al. Extended abstract: Secure device pairing based on a visual channel, in: IEEE Symposium on Security and Privacy, 2006
    • (2006) IEEE Symposium on Security and Privacy
    • Saxena, N.1
  • 14
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • Springer
    • Boyko V., MacKenzie P., and Patel S. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Advances in Cryptology-Eurocrypt (2000), Springer 156-171
    • (2000) Advances in Cryptology-Eurocrypt , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 15
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano, R.J. Anderson, The resurrecting duckling: Security issues for ad-hoc wireless networks, in: Security Protocols Workshop, 1999
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 16
    • 85084163516 scopus 로고    scopus 로고
    • Network-in-a-box: How to set up a secure wireless network in under a minute
    • D. Balfanz, et al. Network-in-a-box: How to set up a secure wireless network in under a minute, in: USENIX Security, 2004, pp. 207-222
    • (2004) USENIX Security , pp. 207-222
    • Balfanz, D.1
  • 20
    • 56649111524 scopus 로고    scopus 로고
    • Simple and effective defense against evil twin access points
    • V. Roth, et al. Simple and effective defense against evil twin access points, in: ACM Conference on Wireless Network Security, WISEC, 2008, pp. 220-235
    • (2008) ACM Conference on Wireless Network Security, WISEC , pp. 220-235
    • Roth, V.1
  • 24
    • 56649100493 scopus 로고    scopus 로고
    • HAPADEP: Human-assisted pure audio device pairing
    • Soriente C., Tsudik G., and Uzun E. HAPADEP: Human-assisted pure audio device pairing. Information Security (2008) 385-400
    • (2008) Information Security , pp. 385-400
    • Soriente, C.1    Tsudik, G.2    Uzun, E.3
  • 27
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • ISC
    • T. Kindberg, K. Zhang, Validating and securing spontaneous associations between wireless devices, in: Information Security Conference, ISC, 2003, pp. 44-53
    • (2003) Information Security Conference , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 29
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • UbiComp, Springer-Verlag, London, UK
    • Holmquist L.E., et al. Smart-its friends: A technique for users to easily establish connections between smart artefacts. Ubiquitous Computing. UbiComp (2001), Springer-Verlag, London, UK 116-122
    • (2001) Ubiquitous Computing , pp. 116-122
    • Holmquist, L.E.1
  • 30
    • 55749083053 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • PERVASIVE, Springer
    • Mayrhofer R., and Gellersen H. Shake well before use: Authentication based on accelerometer data. Pervasive Computing. PERVASIVE (2007), Springer
    • (2007) Pervasive Computing
    • Mayrhofer, R.1    Gellersen, H.2
  • 33
    • 70449696212 scopus 로고    scopus 로고
    • Personal Communication, Mar
    • J.M. McCune, Personal Communication, Mar. 2008
    • (2008)
    • McCune, J.M.1
  • 34
    • 70449688705 scopus 로고    scopus 로고
    • Personal Communication, Mar
    • K. Kostiainen, Personal Communication, Mar. 2008
    • (2008)
    • Kostiainen, K.1
  • 35
    • 0346271799 scopus 로고    scopus 로고
    • Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
    • Faulkner L. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers 35 3 (2003) 379-383
    • (2003) Behavior Research Methods, Instruments, & Computers , vol.35 , Issue.3 , pp. 379-383
    • Faulkner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.