-
1
-
-
79958099045
-
Nenya: Subtle and eyes-free mobile input with a magnetically-tracked finger ring
-
D Ashbrook, P Baudisch, and S White, Nenya: Subtle and eyes-free mobile input with a magnetically-tracked finger ring, Proc. CHI, 2011, pp. 2043-2046.
-
(2011)
Proc. CHI
, pp. 2043-2046
-
-
Ashbrook, D.1
Baudisch, P.2
White, S.3
-
4
-
-
78249234394
-
GesturePIN: Using discrete gestures for associating mobile devices
-
MK Chong, G Marsden, and H Gellersen, GesturePIN: Using discrete gestures for associating mobile devices, Proc. MobileHCI, 2010, pp. 261-264.
-
(2010)
Proc. MobileHCI
, pp. 261-264
-
-
Mk, C.1
Marsden, G.2
Gellersen, H.3
-
5
-
-
34548211830
-
Plug 'n play simplicity for wireless medical body sensors
-
DOI 10.1007/s11036-007-0016-2, Special Issue on Pervasive Healthcare
-
T Falck, H Baldus, J Espina, and K Klabunde, Plug'n play simplicity for wireless medical body sensors, Mobile Network Applications 12 (2007), no. 2-3, 143-153. (Pubitemid 47324546)
-
(2007)
Mobile Networks and Applications
, vol.12
, Issue.2-3
, pp. 143-153
-
-
Falck, T.1
Baldus, H.2
Espina, J.3
Klabunde, K.4
-
6
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
W Henecka, S Kögl, AR Sadeghi, T Schneider, and I Wehrenberg, TASTY: tool for automating secure two-party computations, Proc. ACM Conf. on Computer and communications security, 2010, pp. 451-462.
-
(2010)
Proc. ACM Conf. on Computer and Communications Security
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.R.3
Schneider, T.4
Wehrenberg, I.5
-
7
-
-
84945588227
-
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
-
Ubicomp 2001: Ubiquitous Computing
-
LE Holmquist, F Mattern, B Schiele, P Alahuhta, M Beigl, and HW Gellersen, Smartits friends: A technique for users to easily establish connections between smart artefacts, Proc. Ubicomp, 2001, pp. 116-122. (Pubitemid 33347301)
-
(2001)
Lecture Notes in Computer Science
, Issue.2201
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
8
-
-
84968503742
-
Elliptic curve cryptosystems
-
N Koblitz, Elliptic curve cryptosystems, Mathematics of Computation 48 (1987), no. 177, 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
9
-
-
80755188493
-
-
Report 2010/079
-
V Kolesnikov, AR Sadeghi, and T Schneider, From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design, Cryptology ePrint Archive, Report 2010/079, 2010, http://eprint.iacr. org/.
-
(2010)
From Dust to Dawn: Practically Efficient Two-party Secure Function Evaluation Protocols and their Modular Design
-
-
Kolesnikov, V.1
Ar, S.2
Schneider, T.3
-
10
-
-
70449686547
-
A comparative study of secure device pairing methods
-
A Kumar, N Saxena, G Tsudik, and E Uzun, A comparative study of secure device pairing methods, Pervasive and Mobile Computing 5 (2009), no. 6, 734-749.
-
(2009)
Pervasive and Mobile Computing
, vol.5
, Issue.6
, pp. 734-749
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
12
-
-
55749104368
-
Spontaneous mobile device authentication based on sensor data
-
R Mayrhofer and H Gellersen, Spontaneous mobile device authentication based on sensor data, Information Security Technical Report 13 (2008), no. 3, 136-150.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.3
, pp. 136-150
-
-
Mayrhofer, R.1
Gellersen, H.2
-
13
-
-
18944372608
-
FreeDigiter: A contact-free device for gesture control
-
Proceedings Eighth International Symposium on Wearable Computers, ISWC 2004
-
C Metzger, M Anderson, and T Starner, Freedigiter: a contact-free device for gesture control, Proc. ISWC, 2004, pp. 18-21. (Pubitemid 40701045)
-
(2004)
Proceedings - International Symposium on Wearable Computers, ISWC
, pp. 18-21
-
-
Metzger, C.1
Anderson, M.2
Starner, T.3
-
14
-
-
70450172654
-
Disappearing mobile devices
-
T Ni and P Baudisch, Disappearing mobile devices, Proc. UIST, 2009, pp. 101-110.
-
(2009)
Proc. UIST
, pp. 101-110
-
-
Ni, T.1
Baudisch, P.2
-
15
-
-
32244434861
-
Synctap: Synchronous user operation for spontaneous network connection
-
J Rekimoto, Synctap: synchronous user operation for spontaneous network connection, Personal and Ubiquitous Computing 8 (2004), no. 2, 126-134.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.2
, pp. 126-134
-
-
Rekimoto, J.1
-
16
-
-
34548263614
-
Proxnet: Secure dynamic wireless connection by proximity sensing
-
J Rekimoto, T Miyaki, and M Kohno, Proxnet: Secure dynamic wireless connection by proximity sensing, Proc. Pervasive, 2004, pp. 213-218.
-
(2004)
Proc. Pervasive
, pp. 213-218
-
-
Rekimoto, J.1
Miyaki, T.2
Kohno, M.3
-
17
-
-
67650667827
-
KeyLED - Transmitting sensitive data over out-of-band channels in wireless sensor networks
-
R Roman and J Lopez, KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks, Proc. MASS, 2008, pp. 796-801.
-
(2008)
Proc. MASS
, pp. 796-801
-
-
Roman, R.1
Lopez, J.2
-
18
-
-
79958247302
-
A parallel architecture for fast computation of elliptic curve scalar multiplication over gf(2m)
-
N Saqib, F Rodriguez-Henriquez, and A Diaz-Perez, A parallel architecture for fast computation of elliptic curve scalar multiplication over gf(2m), Proc. Parallel and Distributed Processing Symp., 2004, pp. 144-152.
-
(2004)
Proc. Parallel and Distributed Processing Symp.
, pp. 144-152
-
-
Saqib, N.1
Rodriguez-Henriquez, F.2
Diaz-Perez, A.3
-
19
-
-
61849147296
-
Secure pairing of interface constrained devices
-
C Soriente, Gene Tsudik, and E Uzun, Secure pairing of interface constrained devices, International Journal of Security and Networks 4 (2009), no. 1/2, 17-26.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 17-26
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
20
-
-
80755188488
-
Pre-authentication using infrared
-
A Spahié, M Kreutzer, M Kahmer, and S Chandratilleke, Pre-authentication using infrared, Proc. Workshop on Privacy, Security and Trust within the Context of Pervasive Computing, 2005, pp. 1-7.
-
(2005)
Proc. Workshop on Privacy, Security and Trust WithIn the Context of Pervasive Computing
, pp. 1-7
-
-
Spahié, A.1
Kreutzer, M.2
Kahmer, M.3
Chandratilleke, S.4
-
21
-
-
0033860841
-
Force and timing variability in rhythmic unimanual tapping
-
D Sternad, WJ Dean, and K M Newell, Force and timing variability in rhythmic unimanual tapping, Journal of Motor Behavior 32 (2000), no. 3, 249-267.
-
(2000)
Journal of Motor Behavior
, vol.32
, Issue.3
, pp. 249-267
-
-
Sternad, D.1
Wj, D.2
Newell, K.M.3
-
22
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
E Uzun, K Karvonen, and N Asokan, Usability analysis of secure pairing methods, Financial Cryptography and Data Security, 2007, pp. 307-324. (Pubitemid 351153064)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
23
-
-
0001853125
-
The computer for the 21st century
-
M Weiser, The computer for the 21st century, Scientific American (2002), 94-104.
-
(2002)
Scientific American
, pp. 94-104
-
-
Weiser, M.1
-
24
-
-
4544306901
-
Recognizing song-based blink patterns: Applications for restricted and universal access
-
T Westeyn and T Starner, Recognizing song-based blink patterns: Applications for restricted and universal access, Proc. Automatic Face and Gesture Recog., 2004, pp. 717-722.
-
(2004)
Proc. Automatic Face and Gesture Recog.
, pp. 717-722
-
-
Westeyn, T.1
Starner, T.2
-
25
-
-
70450181317
-
Tapsongs: Tapping rhythm-based passwords on a single binary sensor
-
JO Wobbrock, Tapsongs: tapping rhythm-based passwords on a single binary sensor, Proc. UIST, 2009, pp. 93-96.
-
(2009)
Proc. UIST
, pp. 93-96
-
-
Jo, W.1
|