-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
D. Balfanz, D. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In NDSS, 2002.
-
(2002)
NDSS
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
2
-
-
0038629682
-
Analysis of key-exchange protocols and their use for building secure channels
-
R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT, 2001.
-
(2001)
EUROCRYPT
-
-
Canetti, R.1
Krawczyk, H.2
-
3
-
-
79959884874
-
Message-in-a-bottle: Userfriendly and secure key deployment for sensor nodes
-
K. Cynthia, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: Userfriendly and secure key deployment for sensor nodes. In ACM SenSys- 2007.
-
(2007)
ACM SenSys
-
-
Cynthia, K.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
4
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
6
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and Clear: Human-Verifiable Authentication Based on Audio. In ICDCS, 2006.
-
(2006)
ICDCS
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
9
-
-
38149055220
-
SAS-based authenticated key agreement
-
S. Pasini and S. Vaudenay. SAS-Based Authenticated Key Agreement. In PKC, 2006.
-
(2006)
PKC
-
-
Pasini, S.1
Vaudenay, S.2
-
10
-
-
3142579333
-
Hash visualization: A new technique to improve real-world security
-
A. Perrig and D. Song. Hash visualization: a new technique to improve real-world security. In CrypTEC, 1999.
-
(1999)
CrypTEC
-
-
Perrig, A.1
Song, D.2
-
14
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
16
-
-
51849096610
-
Security associations in personal networks: A comparative analysis
-
J. Suomalainen, J. Valkonen, and N. Asokan. Security associations in personal networks: A comparative analysis. In ESAS, 2007.
-
(2007)
ESAS
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
17
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Vaudenay, S.1
-
19
-
-
0017957882
-
A survey of threshold selection techniques
-
J. Weszka. A survey of threshold selection techniques. In Computer Graphics and Image Processing. Vol. 7, 1978, pp. 259-265.
-
(1978)
Computer Graphics and Image Processing
, vol.7
, pp. 259-265
-
-
Weszka, J.1
|