-
2
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Network & Distributed System Security (NDSS) (2002)
-
(2002)
Network & Distributed System Security (NDSS)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
3
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 453. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 453
-
-
Canetti, R.1
Krawczyk, H.2
-
4
-
-
77953853641
-
-
Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpuconstrained devices. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2005)
-
Castelluccia, C., Mutaf, P.: Shake them up!: a movement-based pairing protocol for cpuconstrained devices. In: International Conference on Mobile Systems, Applications, and Services (MobiSys) (2005)
-
-
-
-
6
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
SenSys
-
Cynthia, K., Luk, M., Negi, R., Perrig, A.: Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In: ACM Conference on Embedded Networked Sensor Systems (SenSys) (2007)
-
(2007)
ACM Conference on Embedded Networked Sensor Systems
-
-
Cynthia, K.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
7
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004 (March 2004)
-
(2004)
IEEE INFOCOM 2004
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
8
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
CCS
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM Computer and Communications Security, CCS (2003)
-
(2003)
ACM Computer and Communications Security
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
10
-
-
0346271799
-
Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
-
Faulkner, L.: Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers 35(3), 379-383 (2003)
-
(2003)
Behavior Research Methods, Instruments, & Computers
, vol.35
, Issue.3
, pp. 379-383
-
-
Faulkner, L.1
-
11
-
-
84907904009
-
The personal sensor network: A user-centric monitoring solution
-
Giorgetti, G., Manes, G., Lewis, J.H., Mastroianni, S.T., Gupta, S.K.S.: The personal sensor network: a user-centric monitoring solution. In: BodyNets 2007: Proceedings of the ICST 2nd international conference on Body area networks (2007)
-
(2007)
BodyNets 2007: Proceedings of the ICST 2nd international conference on Body area networks
-
-
Giorgetti, G.1
Manes, G.2
Lewis, J.H.3
Mastroianni, S.T.4
Gupta, S.K.S.5
-
12
-
-
33947635594
-
Loud and Clear: Human-Verifiable Authentication Based on Audio
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and Clear: Human-Verifiable Authentication Based on Audio. In: International Conference on Distributed Computing Systems (ICDCS) (2006)
-
(2006)
International Conference on Distributed Computing Systems (ICDCS)
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
13
-
-
84945588227
-
-
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, 2201, p. 116. Springer, Heidelberg (2001)
-
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)
-
-
-
-
14
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
Hu, F., Sharma, N.: Security considerations in ad hoc sensor networks. Ad Hoc Networks 3 (2005)
-
(2005)
Ad Hoc Networks
, vol.3
-
-
Hu, F.1
Sharma, N.2
-
16
-
-
84885941616
-
-
Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 90-107. Springer, Heidelberg (2006)
-
Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90-107. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
26444533861
-
Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person
-
Pervasive
-
Lester, J., Hannaford, B., Borriello, G.: Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person. In: International Conference on Pervasive Computing ( Pervasive) (2004)
-
(2004)
International Conference on Pervasive Computing
-
-
Lester, J.1
Hannaford, B.2
Borriello, G.3
-
18
-
-
51249087814
-
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
-
Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Information Processing in Sensor Networks (IPSN) (2008)
-
(2008)
Information Processing in Sensor Networks (IPSN)
-
-
Liu, A.1
Ning, P.2
-
20
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (2004)
-
(2004)
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
21
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. IEEE Security & Privacy (2005)
-
(2005)
IEEE Security & Privacy
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
22
-
-
33746764996
-
Wireless sensor networks for personal health monitoring: Issues and an implementation
-
Milenkovic, A., Otto, C., Jovanov, E.: Wireless sensor networks for personal health monitoring: Issues and an implementation. Computer Communications 29(13-14), 2521-2533 (2006)
-
(2006)
Computer Communications
, vol.29
, Issue.13-14
, pp. 2521-2533
-
-
Milenkovic, A.1
Otto, C.2
Jovanov, E.3
-
23
-
-
33745832230
-
-
Pasini, S., Vaudenay, S.: SAS-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 395-409. Springer, Heidelberg (2006)
-
Pasini, S., Vaudenay, S.: SAS-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395-409. Springer, Heidelberg (2006)
-
-
-
-
24
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J.,Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53-57 (2004)
-
(2004)
Communications of the ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
25
-
-
0034771605
-
Spins: Security protocols for sensor netowrks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: Spins: security protocols for sensor netowrks. In: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM) (2001)
-
(2001)
ACM Annual International Conference on Mobile Computing and Networking (MOBICOM)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
26
-
-
45749134695
-
-
Prasad, R., Saxena, N.: Efficient device pairing using human-comparable audiovisual patterns. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 328-345. Springer, Heidelberg (2008)
-
Prasad, R., Saxena, N.: Efficient device pairing using human-comparable audiovisual patterns. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 328-345. Springer, Heidelberg (2008)
-
-
-
-
29
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Saxena, N., Ekberg, J.-E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel. IEEE Security & Privacy, short paper (2006)
-
(2006)
IEEE Security & Privacy, short paper
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
30
-
-
57049123749
-
Automated device pairing for asymmetric pairing scenarios
-
Chen, L, Ryan, M.D, Wang, G, eds, ICICS 2008, Springer, Heidelberg
-
Saxena, N., Uddin, B.: Automated device pairing for asymmetric pairing scenarios. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 311-327. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 311-327
-
-
Saxena, N.1
Uddin, B.2
-
31
-
-
0033682228
-
-
Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: IEEE Conference on Computer Vision and Pattern Recognition (June 2000)
-
Schneiderman, H., Kanade, T.: A statistical method for 3d object detection applied to faces and cars. In: IEEE Conference on Computer Vision and Pattern Recognition (June 2000)
-
-
-
-
32
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.K.: Swatt: Software-based attestation for embedded devices. IEEE Security & Privacy (2004)
-
(2004)
IEEE Security & Privacy
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.K.4
-
34
-
-
56649100493
-
-
Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: Human-assisted pure audio device pairing. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, 5222, pp. 385-400. Springer, Heidelberg (2008)
-
Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: Human-assisted pure audio device pairing. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 385-400. Springer, Heidelberg (2008)
-
-
-
-
35
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop (1999)
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
36
-
-
77954442474
-
Confidence-based data management for personal area sensor networks
-
ACM, New York
-
Tatbul, N., Buller, M., Hoyt, R., Mullen, S., Zdonik, S.: Confidence-based data management for personal area sensor networks. In: DMSN 2004:1st international workshop on Data management for sensor networks. ACM, New York (2004)
-
(2004)
DMSN 2004:1st international workshop on Data management for sensor networks
-
-
Tatbul, N.1
Buller, M.2
Hoyt, R.3
Mullen, S.4
Zdonik, S.5
-
37
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
-
Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 307-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
38
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
|