-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P., and Wong, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the Network and Distributed System Security Conference (NDSS) (2002).
-
(2002)
Proceedings of the Network and Distributed System Security Conference (NDSS)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.C.4
-
2
-
-
60149100977
-
-
August
-
Bluetooth Special Interest Group. Simple Pairing Whitepaper, revision v10r00. http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6- F2CCFA26F70F/0/SimplePairing-WP-V10r00.pdf, August 2006.
-
(2006)
Simple Pairing Whitepaper Revision v10r00
-
-
-
7
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Goodrich, M. T., Sirivianos, M., Solis, J., Tsudik, G., and Uzun, E. Loud and clear: Human-verifiable authentication based on audio. In International Conference on Distributed Computing (ICDCS) (2006).
-
(2006)
International Conference on Distributed Computing (ICDCS)
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
9
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W. H. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy (2008).
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Heydt-Benjamin, T.S.1
Ransford, B.2
Clark, S.S.3
Defend, B.4
Morgan, W.5
Fu, K.6
Kohno, T.7
Maisel, W.H.8
-
10
-
-
0742293892
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Holmquist, L. E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., and Gellersen, H.-W. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Proceedings of Ubicomp (2001).
-
(2001)
Proceedings of Ubicomp
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
11
-
-
70349332824
-
Caveat emptor: A comparative study of secure device pairing methods
-
Kumar, A., Saxena, N., Tsudik, G., and Uzun, E. Caveat emptor: A comparative study of secure device pairing methods. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom) (2009).
-
(2009)
Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom)
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
12
-
-
35348868994
-
Efficient mutual data authentication using manually authenticated strings
-
Laur, S., and Nyberg, K. Efficient mutual data authentication using manually authenticated strings. In Cryptology and Network Security (CANS) (2006).
-
(2006)
Cryptology and Network Security (CANS)
-
-
Laur, S.1
Nyberg, K.2
-
13
-
-
26444533861
-
"Are you with me?" - Using accelerometers to determine if two devices are carried by the same person
-
Lester, J., Hannaford, B., and Gaetano, B. "are you with me?" - Using accelerometers to determine if two devices are carried by the same person. In Proceedings of Pervasive (2004).
-
(2004)
Proceedings of Pervasive
-
-
Lester, J.1
Hannaford, B.2
Gaetano, B.3
-
14
-
-
70450239642
-
SPATE: Small-group PKI-less authenticated trust establishment
-
Lin, Y.-H., Studer, A., Hsiao, H.-C., McCune, J., Wang, K.-H., Krohn, M., Lin, P.-L., Perrig, A., Sun, H.-M., and Yang, B.-Y. SPATE: Small-group PKI-less Authenticated Trust Establishment. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys) (2009).
-
(2009)
Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
16
-
-
80755143996
-
(sp) Iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
-
Marquadt, P., Verma, A., Carter, H., and Traynor, P. (sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2011).
-
(2011)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Marquadt, P.1
Verma, A.2
Carter, H.3
Traynor, P.4
-
17
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Mayrhofer, R., and Gellersen, H. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8, 6 (2009).
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 6
-
-
Mayrhofer, R.1
Gellersen, H.2
-
19
-
-
84855689741
-
Sonic nirvana: Using MEMS accelerometers as acoustic pickups in musical instruments
-
Feb
-
O'Reilly, R., Khenkin, A., and Harney, K. Sonic nirvana: Using MEMS accelerometers as acoustic pickups in musical instruments. Analog Dialogue 43 (Feb. 2009).
-
(2009)
Analog Dialogue
, vol.43
-
-
O'reilly, R.1
Khenkin, A.2
Harney, K.3
-
20
-
-
84855678703
-
-
PayPal. Paypal mobile payments. https://personal.paypal.com/us/cgibin/? &cmd=-render-content&content-ID=marketing-us/mobile-payments.
-
-
-
-
22
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Saxena, N., Ekberg, J.-E., Kostiainen, K., and Asokan, N. Secure device pairing based on a visual channel. In Proceedings of the IEEE Symposium on Security and Privacy (2006).
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
24
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Stajano, F., and Anderson, R. J. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop (1999).
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
26
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
Vaudenay, S. Secure communications over insecure channels based on short authenticated strings. In Advances in Cryptology (Crypto) (2005).
-
(2005)
Advances in Cryptology (Crypto)
-
-
Vaudenay, S.1
|