-
2
-
-
81155140118
-
Why johnny still can't encrypt: Evaluating the usability of email encryption software
-
S. Sheng, L. Broderick, J. Hyland, and C. Koranda, "Why Johnny Still Can't Encrypt: Evaluating the Usability of Email Encryption Software," Proc. Symp. Usable Privacy and Security, 2006.
-
(2006)
Proc. Symp. Usable Privacy and Security
-
-
Sheng, S.1
Broderick, L.2
Hyland, J.3
Koranda, C.4
-
3
-
-
33745812088
-
Secrecy, flagging, and paranoia: Adoption criteria in encrypted email
-
S. Gaw, E.W. Felten, and P. Fernandez-Kelly, "Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email," Proc. SIGCHI Conf. Human Factors in Computing Systems, pp. 591-600, 2006.
-
(2006)
Proc. SIGCHI Conf. Human Factors in Computing Systems
, pp. 591-600
-
-
Gaw, S.1
Felten, E.W.2
Fernandez-Kelly, P.3
-
5
-
-
77953853641
-
Shake them up! A movement-based pairing protocol for CPU-constrained devices
-
C. Castelluccia and P. Mutaf, "Shake Them Up! A Movement-Based Pairing Protocol for CPU-Constrained Devices," Proc. ACM/ Usenix MobiSys, 2005.
-
(2005)
Proc. ACM / Usenix MobiSys
-
-
Castelluccia, C.1
Mutaf, P.2
-
10
-
-
3142521758
-
Public-key support for group collaboration
-
C. Ellison and S. Dohrmann, "Public-Key Support for Group Collaboration," ACM Trans. Information and System Security, vol. 6, no. 4, pp. 547-565, 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.4
, pp. 547-565
-
-
Ellison, C.1
Dohrmann, S.2
-
11
-
-
3142579333
-
Hash visualization: A new technique to improve real-world security
-
Jul. M. Blum and C. H. Lee, eds.
-
A. Perrig and D. Song, "Hash Visualization: A New Technique to Improve Real-World Security," Proc. Int'l Workshop Cryptographic Techniques and E-Commerce (CrypTEC '99), M. Blum and C. H. Lee, eds., pp. 131-138, Jul. 1999.
-
(1999)
Proc. Int'l Workshop Cryptographic Techniques and E-Commerce (CrypTEC '99)
, pp. 131-138
-
-
Perrig, A.1
Song, D.2
-
15
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Nov.
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 235-244, Nov. 2000.
-
(2000)
Proc. ACM Conf. Computer and Comm. Security (CCS)
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
16
-
-
84978523717
-
A secure audio teleconference system
-
D. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A Secure Audio Teleconference System," Proc. Advances in Cryptology (Crypto '90), pp. 520-528, 1990.
-
(1990)
Proc. Advances in Cryptology (Crypto '90)
, pp. 520-528
-
-
Steer, D.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
17
-
-
0034247455
-
Key agreement in dynamic peer groups
-
Aug.
-
M. Steiner, G. Tsudik, and M. Waidner, "Key Agreement in Dynamic Peer Groups," IEEE Trans. Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, Aug. 2000.
-
(2000)
IEEE Trans. Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
18
-
-
84937394156
-
Round-efficient conference-key agreement protocols with provable security
-
W.-G. Tzeng and Z. Tzeng, "Round-Efficient Conference-Key Agreement Protocols with Provable Security," Proc. Advances in Cryptology (ASIACRYPT), pp. 614-628, 2000.
-
(2000)
Proc. Advances in Cryptology (ASIACRYPT)
, pp. 614-628
-
-
Tzeng, W.-G.1
Tzeng, Z.2
-
20
-
-
0034317075
-
Key-agreement in ad-hoc networks
-
Nov.
-
N. Asokan and P. Ginzboorg, "Key-Agreement in Ad-Hoc Networks," Computer Comm., vol. 23, no. 17, pp. 1627-1637, Nov. 2000.
-
(2000)
Computer Comm.
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
21
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proc. Ninth Ann. Network and Distributed System Security Symp. (NDSS), 2002.
-
(2002)
Proc. Ninth Ann. Network and Distributed System Security Symp. (NDSS)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
22
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Feb.
-
M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," Proc. IEEE, special issue on cryptography, vol. 94, no. 2, pp. 467-478, Feb. 2006.
-
(2006)
Proc. IEEE Special Issue on Cryptography
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
23
-
-
70450230837
-
-
NFC Forum
-
NFC Forum, "NFC Forum: Specifications," http://www.nfc-forum. org/specs, 2010.
-
(2010)
NFC Forum: Specifications
-
-
-
24
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R.J. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," Proc. Security Protocols Workshop, pp. 172-194, 1999.
-
(1999)
Proc. Security Protocols Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
26
-
-
78650421160
-
Gangs: Gather authenticate 'n group securely
-
Sept.
-
C.-H.O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J.M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu, "GAnGS: Gather Authenticate 'n Group Securely," Proc. ACM MobiCom, Sept. 2008.
-
(2008)
Proc. ACM MobiCom
-
-
Chen, C.-H.O.1
Chen, C.-W.2
Kuo, C.3
Lai, Y.-H.4
McCune, J.M.5
Studer, A.6
Perrig, A.7
Yang, B.-Y.8
Wu, T.-C.9
-
29
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. Cryptology and Network Security (CANS), pp. 90-107, 2006.
-
(2006)
Proc. Cryptology and Network Security (CANS)
, pp. 90-107
-
-
Laur, S.1
Nyberg, K.2
-
30
-
-
61849103248
-
Wi-fi protected setup specification
-
"Wi-Fi Protected Setup Specification,"WiFi Alliance Document, 2007.
-
(2007)
WiFi Alliance Document
-
-
-
31
-
-
85076769385
-
Persistent personal names for globally connected mobile devices
-
Nov.
-
B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris, "Persistent Personal Names for Globally Connected Mobile Devices," Proc. Seventh USENIX Symp. Operating Systems Design and Implementation (OSDI), Nov. 2006.
-
(2006)
Proc. Seventh USENIX Symp. Operating Systems Design and Implementation (OSDI)
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
32
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M.T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human-Verifiable Authentication Based on Audio," Proc. Int'l Conf. Distributed Computing (ICDCS), p. 10, 2006.
-
(2006)
Proc. Int'l Conf. Distributed Computing (ICDCS)
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
33
-
-
34347382415
-
Colour displays for categorical images
-
June
-
C. Glasbey, G. van der Heijden, V.F.K. Toh, and A. Gray, "Colour Displays for Categorical Images," Color Research and Application, vol. 32, no. 4, pp. 304-309, June 2007.
-
(2007)
Color Research and Application
, vol.32
, Issue.4
, pp. 304-309
-
-
Glasbey, C.1
Heijden Der G.Van2
Toh, V.F.K.3
Gray, A.4
-
34
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay, "Secure Communications over Insecure Channels Based on Short Authenticated Strings," Proc. Advances in Cryptol-ogy (Crypto), pp. 309-326, 2005.
-
(2005)
Proc. Advances in Cryptol-ogy (Crypto)
, pp. 309-326
-
-
Vaudenay, S.1
-
35
-
-
0742293892
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
L.E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," Proc. Int'l Symp. Ubiquitous Computing (Ubicomp), 2001.
-
(2001)
Proc. Int'l Symp. Ubiquitous Computing (Ubicomp)
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
36
-
-
84876402257
-
Ad hoc security associations for groups
-
J. Valkonen, N. Asokan, and K. Nyberg, "Ad Hoc Security Associations for Groups," Proc. Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), pp. 150-164, 2006.
-
(2006)
Proc. Security and Privacy in Ad-Hoc and Sensor Networks (ESAS)
, pp. 150-164
-
-
Valkonen, J.1
Asokan, N.2
Nyberg, K.3
-
37
-
-
33745837743
-
Password-based group key exchange in a constant number of rounds
-
M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval, "Password-Based Group Key Exchange in a Constant Number of Rounds," Proc. Public Key Cryptography (PKC), pp. 427-442, 2006.
-
(2006)
Proc. Public Key Cryptography (PKC)
, pp. 427-442
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Pointcheval, D.4
-
38
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. Advances in Cryptology, pp. 47-53, 1984.
-
(1984)
Proc. Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
41
-
-
0003651338
-
Coin flipping by telephone
-
Aug.
-
M. Blum, "Coin Flipping by Telephone," Proc. Advances in Cryptography, pp. 11-15, Aug. 1982.
-
(1982)
Proc. Advances in Cryptography
, pp. 11-15
-
-
Blum, M.1
-
42
-
-
78049494150
-
Issues in security and privacy
-
M. Jakobsson, "Issues in Security and Privacy," Lecture Slides, http://www.informatics.indiana.edu/markus/i400, 2006.
-
(2006)
Lecture Slides
-
-
Jakobsson, M.1
-
43
-
-
70450239642
-
SPATE: Small-group pki-less authenticated trust establishment
-
Y.-H. Lin, A. Studer, H.-C. Hsiao, J.M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, "SPATE: Small-Group PKI-Less Authenticated Trust Establishment," Proc. ACM MobiSys, June 2009.
-
(2009)
Proc. ACM MobiSys, June
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
44
-
-
78049493355
-
A MIME content-type for directory information
-
Sept.
-
T. Howes and M. Smith, "A MIME Content-Type for Directory Information," IETF RFC 2425, Sept. 1998.
-
(1998)
IETF RFC
, vol.2425
-
-
Howes, T.1
Smith, M.2
-
45
-
-
78049494767
-
-
Mozilla Thunderbird 2 http://www.mozilla.com/en-US/ thunderbird Dec. 2008.
-
(2008)
Mozilla Thunderbird
, vol.2
-
-
-
46
-
-
20744448335
-
-
Apr.
-
B. Cohen, "Bittorrent," http://www.bittorrent.com, Apr. 2001.
-
(2001)
Bittorrent
-
-
Cohen, B.1
-
49
-
-
38449106230
-
-
Jan.
-
M. Szeredi, "SSH Filesystem," http://fuse.sourceforge.net/ sshfs. html, Jan. 2005.
-
(2005)
SSH Filesystem
-
-
Szeredi, M.1
-
50
-
-
78049503424
-
-
MDA: Mobile Data Assoc
-
MDA: Mobile Data Assoc. The Q1 2008 UK Mobile Trends Report http://www.swiftcrm.net/MDA-Q1-2008-UK-mobile- report.pdf 2009.
-
(2009)
The Q1 2008 UK Mobile Trends Report
-
-
-
51
-
-
60649089361
-
Transaction oriented text messaging with trusted-sms
-
A. Grillo, A. Lentini, G. Me, and G.F. Italiano, "Transaction Oriented Text Messaging with Trusted-SMS," Proc. Ann. Computer Security Applications Conf., pp. 485-494, 2008.
-
(2008)
Proc. Ann. Computer Security Applications Conf.
, pp. 485-494
-
-
Grillo, A.1
Lentini, A.2
Me, G.3
Italiano, G.F.4
-
54
-
-
19944413478
-
Using visual tags to bypass bluetooth device discovery
-
Jan.
-
D. Scott, R. Sharp, A. Madhavapeddy, and E. Upton, "Using Visual Tags to Bypass Bluetooth Device Discovery," ACM Mobile Computer Comm. Rev., vol. 9, no. 1, pp. 41-53, Jan. 2005.
-
(2005)
ACM Mobile Computer Comm. Rev.
, vol.9
, Issue.1
, pp. 41-53
-
-
Scott, D.1
Sharp, R.2
Madhavapeddy, A.3
Upton, E.4
-
55
-
-
19944391466
-
Using camera-equipped mobile phones for interacting with real-world objects
-
Apr.
-
M. Rohs and B. Gfeller, "Using Camera-Equipped Mobile Phones for Interacting with Real-World Objects," Proc. Advances in Pervasive Computing, pp. 265-271, Apr. 2004.
-
(2004)
Proc. Advances in Pervasive Computing
, pp. 265-271
-
-
Rohs, M.1
Gfeller, B.2
-
57
-
-
21644484073
-
Secure/multipurpose internet mail extensions (s/mime) version 3.1 message specification
-
July
-
B. Ramsdell, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification," IETF RFC 3851, July 2004.
-
(2004)
IETF RFC
, vol.3851
-
-
Ramsdell, B.1
-
58
-
-
78049495177
-
-
Scponly http://sublimation.org/scponly 2009.
-
(2009)
Scponly
-
-
-
59
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre, "Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm," Proc. Advances in Cryptology (ASIACRYPT '00), pp. 531-545, 2000.
-
(2000)
Proc. Advances in Cryptology (ASIACRYPT '00)
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
60
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is ssl?)
-
H. Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)," Proc. Advances in Cryptology (CRYPTO '01), pp. 310-331, 2001.
-
(2001)
Proc. Advances in Cryptology (CRYPTO '01)
, pp. 310-331
-
-
Krawczyk, H.1
|