-
2
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Washington, DC, USA, July IEEE Computer Society
-
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun. Loud and clear: Human-verifiable authentication based on audio. In ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 10, Washington, DC, USA, July 2006. IEEE Computer Society.
-
(2006)
ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
3
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
New York, NY, USA, September ACM
-
Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In MobiCom '09: Proceedings of the 15th annual international conference on Mobile computing and networking, pages 321-332, New York, NY, USA, September 2009. ACM.
-
(2009)
MobiCom '09: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
4
-
-
79959884874
-
Messagein-a-Bottle: User-friendly and secure key deployment for sensor nodes
-
New York, NY, USA, November ACM
-
Cynthia Kuo, Mark Luk, Rohit Negi, and Adrian Perrig. Messagein-a-Bottle: user-friendly and secure key deployment for sensor nodes. In Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, pages 233-246, New York, NY, USA, November 2007. ACM.
-
(2007)
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems
, pp. 233-246
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
5
-
-
60149097098
-
Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel
-
New York, NY, USA, September ACM
-
Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pages 128-139, New York, NY, USA, September 2008. ACM.
-
(2008)
MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
7
-
-
61849133288
-
Seeingis-believing: Using camera phones for human verifiable authentication
-
Jonathan M. McCune, Adrian Perrig, and Michael K. Reiter. Seeingis-believing: using camera phones for human verifiable authentication. International Journal of Security and Networks, 4(1/2):43-56, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 43-56
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
9
-
-
79952056012
-
BEDA: Button-enabled device pairing
-
Springer-Verlag
-
Claudio Soriente, Gene Tsudik, and Ersin Uzun. BEDA: Button-enabled device pairing. In International Workshop on Security for Spontaneous Interaction, UbiComp 2007 Workshop Proceedings, Berlin, Heidelberg, September 2007. Springer-Verlag.
-
International Workshop on Security for Spontaneous Interaction, UbiComp 2007 Workshop Proceedings, Berlin, Heidelberg, September 2007
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
10
-
-
56649100493
-
Hapadep: Human-assisted pure audio device pairing
-
Berlin, Heidelberg, September Springer-Verlag
-
Claudio Soriente, Gene Tsudik, and Ersin Uzun. Hapadep: Human-assisted pure audio device pairing. In ISC '08: Proceedings of the 11th international conference on Information Security, pages 385-400, Berlin, Heidelberg, September 2008. Springer-Verlag.
-
(2008)
ISC '08: Proceedings of the 11th International Conference on Information Security
, pp. 385-400
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
12
-
-
77952329424
-
Secret Keys from Entangled Sensor Motes: Implementation and Analysis
-
Hoboken, NJ, USA, March ACM Press
-
Matthias Wilhelm, Ivan Martinovic, and Jens B. Schmitt. Secret Keys from Entangled Sensor Motes: Implementation and Analysis. In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2010), pages 139-144, Hoboken, NJ, USA, March 2010. ACM Press.
-
(2010)
Proceedings of the ACM Conference on Wireless Network Security (WiSec 2010)
, pp. 139-144
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
|