메뉴 건너뛰기




Volumn 9, Issue 12, 2010, Pages 1666-1681

SPATE: Small-group PKI-less authenticated trust establishment

Author keywords

Authentication; human factors; security

Indexed keywords

FILE SHARING; HUMAN FACTORS; PHYSICAL INTERACTIONS; PROBABILISTIC GUARANTEES; SECURITY; SMALL GROUPS; SMART-PHONES; TEXT MESSAGING; TRUST ESTABLISHMENT;

EID: 78049520643     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.150     Document Type: Article
Times cited : (28)

References (60)
  • 5
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up! A movement-based pairing protocol for CPU-constrained devices
    • C. Castelluccia and P. Mutaf, "Shake Them Up! A Movement-Based Pairing Protocol for CPU-Constrained Devices," Proc. ACM/ Usenix MobiSys, 2005.
    • (2005) Proc. ACM / Usenix MobiSys
    • Castelluccia, C.1    Mutaf, P.2
  • 6
  • 18
    • 84937394156 scopus 로고    scopus 로고
    • Round-efficient conference-key agreement protocols with provable security
    • W.-G. Tzeng and Z. Tzeng, "Round-Efficient Conference-Key Agreement Protocols with Provable Security," Proc. Advances in Cryptology (ASIACRYPT), pp. 614-628, 2000.
    • (2000) Proc. Advances in Cryptology (ASIACRYPT) , pp. 614-628
    • Tzeng, W.-G.1    Tzeng, Z.2
  • 20
    • 0034317075 scopus 로고    scopus 로고
    • Key-agreement in ad-hoc networks
    • Nov.
    • N. Asokan and P. Ginzboorg, "Key-Agreement in Ad-Hoc Networks," Computer Comm., vol. 23, no. 17, pp. 1627-1637, Nov. 2000.
    • (2000) Computer Comm. , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 23
    • 70450230837 scopus 로고    scopus 로고
    • NFC Forum
    • NFC Forum, "NFC Forum: Specifications," http://www.nfc-forum. org/specs, 2010.
    • (2010) NFC Forum: Specifications
  • 24
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R.J. Anderson, "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks," Proc. Security Protocols Workshop, pp. 172-194, 1999.
    • (1999) Proc. Security Protocols Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 29
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. Cryptology and Network Security (CANS), pp. 90-107, 2006.
    • (2006) Proc. Cryptology and Network Security (CANS) , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 30
    • 61849103248 scopus 로고    scopus 로고
    • Wi-fi protected setup specification
    • "Wi-Fi Protected Setup Specification,"WiFi Alliance Document, 2007.
    • (2007) WiFi Alliance Document
  • 34
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay, "Secure Communications over Insecure Channels Based on Short Authenticated Strings," Proc. Advances in Cryptol-ogy (Crypto), pp. 309-326, 2005.
    • (2005) Proc. Advances in Cryptol-ogy (Crypto) , pp. 309-326
    • Vaudenay, S.1
  • 38
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. Advances in Cryptology, pp. 47-53, 1984.
    • (1984) Proc. Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 41
  • 42
    • 78049494150 scopus 로고    scopus 로고
    • Issues in security and privacy
    • M. Jakobsson, "Issues in Security and Privacy," Lecture Slides, http://www.informatics.indiana.edu/markus/i400, 2006.
    • (2006) Lecture Slides
    • Jakobsson, M.1
  • 44
    • 78049493355 scopus 로고    scopus 로고
    • A MIME content-type for directory information
    • Sept.
    • T. Howes and M. Smith, "A MIME Content-Type for Directory Information," IETF RFC 2425, Sept. 1998.
    • (1998) IETF RFC , vol.2425
    • Howes, T.1    Smith, M.2
  • 45
    • 78049494767 scopus 로고    scopus 로고
    • Mozilla Thunderbird 2 http://www.mozilla.com/en-US/ thunderbird Dec. 2008.
    • (2008) Mozilla Thunderbird , vol.2
  • 46
    • 20744448335 scopus 로고    scopus 로고
    • Apr.
    • B. Cohen, "Bittorrent," http://www.bittorrent.com, Apr. 2001.
    • (2001) Bittorrent
    • Cohen, B.1
  • 49
    • 38449106230 scopus 로고    scopus 로고
    • Jan.
    • M. Szeredi, "SSH Filesystem," http://fuse.sourceforge.net/ sshfs. html, Jan. 2005.
    • (2005) SSH Filesystem
    • Szeredi, M.1
  • 50
    • 78049503424 scopus 로고    scopus 로고
    • MDA: Mobile Data Assoc
    • MDA: Mobile Data Assoc. The Q1 2008 UK Mobile Trends Report http://www.swiftcrm.net/MDA-Q1-2008-UK-mobile- report.pdf 2009.
    • (2009) The Q1 2008 UK Mobile Trends Report
  • 55
    • 19944391466 scopus 로고    scopus 로고
    • Using camera-equipped mobile phones for interacting with real-world objects
    • Apr.
    • M. Rohs and B. Gfeller, "Using Camera-Equipped Mobile Phones for Interacting with Real-World Objects," Proc. Advances in Pervasive Computing, pp. 265-271, Apr. 2004.
    • (2004) Proc. Advances in Pervasive Computing , pp. 265-271
    • Rohs, M.1    Gfeller, B.2
  • 57
    • 21644484073 scopus 로고    scopus 로고
    • Secure/multipurpose internet mail extensions (s/mime) version 3.1 message specification
    • July
    • B. Ramsdell, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification," IETF RFC 3851, July 2004.
    • (2004) IETF RFC , vol.3851
    • Ramsdell, B.1
  • 58
    • 78049495177 scopus 로고    scopus 로고
    • Scponly http://sublimation.org/scponly 2009.
    • (2009) Scponly
  • 59
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, "Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm," Proc. Advances in Cryptology (ASIACRYPT '00), pp. 531-545, 2000.
    • (2000) Proc. Advances in Cryptology (ASIACRYPT '00) , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 60
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is ssl?)
    • H. Krawczyk, "The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)," Proc. Advances in Cryptology (CRYPTO '01), pp. 310-331, 2001.
    • (2001) Proc. Advances in Cryptology (CRYPTO '01) , pp. 310-331
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.