-
1
-
-
33749571637
-
-
McGraw-Hill
-
F. Adelstein, S.K.S. Gupta, G.G. Richard III, and L. Schwiebert, "Fundamentals of Mobile and Pervasive Computing," McGraw-Hill, 2004.
-
(2004)
Fundamentals of Mobile and Pervasive Computing
-
-
Adelstein, F.1
Gupta, S.K.S.2
Richard III, G.G.3
Schwiebert, L.4
-
2
-
-
2442446612
-
Towards security and privacy for pervasive computing
-
Tokyo, Nov
-
R. Campbell, J. Al-muhtadi, P. Naldurg, G. Sampemane, and M.D. Mickunas,"Towards security and privacy for pervasive computing," in Proc. Intl. Symposium on Software Security, Tokyo, Nov. 2002.
-
(2002)
Proc. Intl. Symposium on Software Security
-
-
Campbell, R.1
Al-muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.D.5
-
3
-
-
70350747665
-
Security in Pervasive Computing
-
Berlin, New York, Springer
-
D. Hutter, Security in Pervasive Computing, LNCS, Berlin, New York, Springer, 2003.
-
(2003)
LNCS
-
-
Hutter, D.1
-
5
-
-
70350771110
-
Green and Sustainable Cyber Physical Security Solutions for Body Area Networks
-
Berkeley, CA, June
-
K. Venkatasubramanian, A. Banerjee, S. K. S. Gupta, "Green and Sustainable Cyber Physical Security Solutions for Body Area Networks," In Proc. 6th Workshop on Body Sensor Networks (BSN'09), Berkeley, CA, June 2009.
-
(2009)
Proc. 6th Workshop on Body Sensor Networks (BSN'09)
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.K.S.3
-
6
-
-
77949516568
-
-
Online, Available
-
TelosB Datasheet from Crossbow, [Online]. Available: http://www.xbow.com/ Products/productdetails.aspx?sid=252
-
TelosB Datasheet from Crossbow
-
-
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener, "Authentication and authenticated key exchanges," in Designs, Codes and Cryptography 2, pp. 107-125, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
10
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Advances in Cryptology: Eurocrypt 2000, Springer-Verlag, pp
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman," in Advances in Cryptology: Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 156-171, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
11
-
-
84947251443
-
The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks
-
F. Stajano, and R. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks." in Proc. 7th Security Protocols Workshop, pp. 172-182, 2000.
-
(2000)
Proc. 7th Security Protocols Workshop
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
13
-
-
33947635594
-
Loud and Clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human-verifiable authentication based on audio," in Proc. 26th IEEE Intl. Conf. on Distributed Computing Systems, pp. 10-17, 2006.
-
(2006)
Proc. 26th IEEE Intl. Conf. on Distributed Computing Systems
, pp. 10-17
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
15
-
-
38349004892
-
Proximity- Based Authentication of Mobile Devices
-
A. Varshavsky, A. Scannell, A. LaMarca, and E. Lara, "Proximity- Based Authentication of Mobile Devices," in Proc. 9th Intl. Conf. on Ubiquitous Computing, pp. 253-270, 2007.
-
(2007)
Proc. 9th Intl. Conf. on Ubiquitous Computing
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
LaMarca, A.3
Lara, E.4
-
19
-
-
1542341272
-
Fine-grained network time synchronization using reference broadcasts
-
Boston, USA, Dec
-
J. Elson, L. Girod, and D. Estrin, "Fine-grained network time synchronization using reference broadcasts," in Proc. 5th Symposium on Operating Systems Design and Implementation, Boston, USA, Dec. 2002.
-
(2002)
Proc. 5th Symposium on Operating Systems Design and Implementation
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
20
-
-
77954700974
-
-
Online, Available
-
Cross Correlation. [Online]. Available: http://local.wasp.uwa.edu.au/ pbourke/miscellaneous/correlate/
-
Cross Correlation
-
-
|