메뉴 건너뛰기




Volumn , Issue , 2008, Pages 27-37

Device pairing using unidirectional physical channels

Author keywords

[No Author keywords available]

Indexed keywords

VIDEO CAMERAS; WIRELESS NETWORKS;

EID: 81055157814     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1142/9789812833266_0003     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 1
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • D. Balfanz, D. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In NDSS, 2002.
    • (2002) NDSS
    • Balfanz, D.1    Smetters, D.2    Stewart, P.3    Wong, H.C.4
  • 2
    • 0038629682 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT, 2001.
    • (2001) EUROCRYPT
    • Canetti, R.1    Krawczyk, H.2
  • 3
    • 79959884874 scopus 로고    scopus 로고
    • Message-in-a-bottle: Userfriendly and secure key deployment for sensor nodes
    • K. Cynthia, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: Userfriendly and secure key deployment for sensor nodes. In ACM SenSys- 2007.
    • (2007) ACM SenSys
    • Cynthia, K.1    Luk, M.2    Negi, R.3    Perrig, A.4
  • 4
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 9
    • 38149055220 scopus 로고    scopus 로고
    • SAS-based authenticated key agreement
    • S. Pasini and S. Vaudenay. SAS-Based Authenticated Key Agreement. In PKC, 2006.
    • (2006) PKC
    • Pasini, S.1    Vaudenay, S.2
  • 10
    • 3142579333 scopus 로고    scopus 로고
    • Hash visualization: A new technique to improve real-world security
    • A. Perrig and D. Song. Hash visualization: a new technique to improve real-world security. In CrypTEC, 1999.
    • (1999) CrypTEC
    • Perrig, A.1    Song, D.2
  • 14
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 16
    • 51849096610 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • J. Suomalainen, J. Valkonen, and N. Asokan. Security associations in personal networks: A comparative analysis. In ESAS, 2007.
    • (2007) ESAS
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 17
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In CRYPTO, 2005.
    • (2005) CRYPTO
    • Vaudenay, S.1
  • 19
    • 0017957882 scopus 로고
    • A survey of threshold selection techniques
    • J. Weszka. A survey of threshold selection techniques. In Computer Graphics and Image Processing. Vol. 7, 1978, pp. 259-265.
    • (1978) Computer Graphics and Image Processing , vol.7 , pp. 259-265
    • Weszka, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.