메뉴 건너뛰기




Volumn , Issue , 2008, Pages 92-103

GAnGS: Gather, authenticate 'n group securely

Author keywords

Group protocol; Key establishment; Operator error; Security

Indexed keywords

EASE OF USE; GROUP PROTOCOL; KEY ESTABLISHMENT; MALICIOUS INSIDERS; OPERATOR ERROR; PUBLIC KEYS; PUBLIC SPACES; PUBLIC-KEY INFRASTRUCTURES; REAL-WORLD; SECURE COMMUNICATIONS; SECURITY; SHARED SECRETS; SYBIL ATTACKS; SYMMETRIC KEYS;

EID: 78650421160     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1409944.1409957     Document Type: Conference Paper
Times cited : (50)

References (30)
  • 2
    • 0034317075 scopus 로고    scopus 로고
    • Key-agreement in ad-hoc networks
    • Nov
    • ASOKAN, N., AND GINZBOORG, P. Key-agreement in ad-hoc networks. Computer Communications 23, 17 (Nov. 2000), 1627-1637.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • ASOKAN, N.1    GINZBOORG, P.2
  • 7
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up! a movement-based pairing protocol for cpu-constrained devices
    • CASTELLUCCIA, C., AND MUTAF, P. Shake them up! a movement-based pairing protocol for cpu-constrained devices. In Proceedings of ACM/Usenix Mobisys (2005).
    • (2005) Proceedings of ACM/Usenix Mobisys
    • CASTELLUCCIA, C.1    MUTAF, P.2
  • 9
    • 3142521758 scopus 로고    scopus 로고
    • Public-key support for group collaboration
    • ELLISON, C., AND DOHRMANN, S. Public-key support for group collaboration. ACM Trans. Inf. Syst. Secur: 6, 4 (2003), 547-565.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 547-565
    • ELLISON, C.1    DOHRMANN, S.2
  • 12
    • 84925902019 scopus 로고
    • How to run a meeting
    • JAY, A. How to run a meeting. Harvard Business Review 54 (1976), 43-57.
    • (1976) Harvard Business Review , vol.54 , pp. 43-57
    • JAY, A.1
  • 17
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • LAUR, S., AND NYBERG, K. Efficient mutual data authentication using manually authenticated strings. In Cryptology and Network Security (CANS) (2006), pp. 90-107.
    • (2006) Cryptology and Network Security (CANS) , pp. 90-107
    • LAUR, S.1    NYBERG, K.2
  • 18
    • 26444533861 scopus 로고    scopus 로고
    • Are you with me? - using accelerometers to determine if two devices are carried by the same person
    • LESTER, J., HANNAFORD, B., AND GAETANO, B. Are you with me? - using accelerometers to determine if two devices are carried by the same person. In Proceedings of Pervasive (2004).
    • (2004) Proceedings of Pervasive
    • LESTER, J.1    HANNAFORD, B.2    GAETANO, B.3
  • 20
    • 60149100160 scopus 로고    scopus 로고
    • LORTZ, V., ROBERTS, D., ERDMANN, B., DAWIDOWSKY, F., HAYES, K., YEE, J. C., AND ISHIDOSHIRO, T. Wi-Fi Simple Config Specification, version 1.0a,. Now known as Wi-Fi Protected Setup, February 2006.
    • LORTZ, V., ROBERTS, D., ERDMANN, B., DAWIDOWSKY, F., HAYES, K., YEE, J. C., AND ISHIDOSHIRO, T. Wi-Fi Simple Config Specification, version 1.0a,. Now known as Wi-Fi Protected Setup, February 2006.
  • 22
  • 24
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • STAJANO, F., AND ANDERSON, R. J. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop (1999), pp. 172-194.
    • (1999) Security Protocols Workshop , pp. 172-194
    • STAJANO, F.1    ANDERSON, R.J.2
  • 30
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • VAUDENAY, S. Secure communications over insecure channels based on short authenticated strings. In Advances in Cryptology (Crypto) (2005), pp. 309-326.
    • (2005) Advances in Cryptology (Crypto) , pp. 309-326
    • VAUDENAY, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.