-
2
-
-
12844272841
-
In search of usable security - Five lessons from the field
-
September-October
-
D. Balfanz, G. Durfee, D.K.Smetters, and R. Grinter. In search of usable security - five lessons from the field. IEEE Journal on Security and Privacy, 2(5):19-24, September-October 2004.
-
(2004)
IEEE Journal on Security and Privacy
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.K.3
Grinter, R.4
-
4
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
In B. Preneel, editor, Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using diffie-hellman. In B. Preneel, editor, Advances in Cryptology-Eurocrypt 2000, volume 1807 of Lecture Notes in Computer Science, pages 156-171. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology-Eurocrypt 2000, Volume 1807 of Lecture Notes in Computer Science
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
5
-
-
85089792386
-
Integrity codes: Message integrity protection and authentication over insecure channels
-
Oakland, CA, May
-
M. Čagalj, J.-P. Hubaux, S. Čapkun, R. Rangaswamy, I. Tsigkogiannia, and M. Srivastava. Integrity codes: Message integrity protection and authentication over insecure channels. In Proceedings of the 27th IEEE Symposium on Security and Privacy, pages 280-294, Oakland, CA, May 2006.
-
(2006)
Proceedings of the 27th IEEE Symposium on Security and Privacy
, pp. 280-294
-
-
Čagalj, M.1
Hubaux, J.-P.2
Čapkun, S.3
Rangaswamy, R.4
Tsigkogiannia, I.5
Srivastava, M.6
-
6
-
-
55949084240
-
Integrity codes: Message integrity protection and authentication over insecure channels
-
October-December
-
S. Čapkun, M. Čagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivastava. Integrity codes: Message integrity protection and authentication over insecure channels. IEEE Transactions on Dependable and Secure Computing, 5(4):208-223, October-December 2008.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 208-223
-
-
Čapkun, S.1
Čagalj, M.2
Rengaswamy, R.3
Tsigkogiannis, I.4
Hubaux, J.-P.5
Srivastava, M.6
-
8
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2(2):107-125, 1992.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
9
-
-
85076470447
-
-
Ettus Inc. Universal software radio peripheral
-
Ettus Inc. Universal software radio peripheral. http: //ettus.com.
-
-
-
-
10
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal, July
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In Proceedings of the 26th International Conference on Distributed Computing Systems, Lisboa, Portugal, July 2006.
-
(2006)
Proceedings of the 26th International Conference on Distributed Computing Systems
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
15
-
-
84907412490
-
Low-cost manufacturing, usability and security: An analysis of bluetooth simple pairing and wi-fi protected setup
-
Lowlands, Scarborough, Trinidad/Tobago, February
-
C. Kuo, J. Walker, and A. Perrig. Low-cost manufacturing, usability and security: An analysis of bluetooth simple pairing and wi-fi protected setup. In Proceedings of the Usable Security Workshop, Lowlands, Scarborough, Trinidad/Tobago, February 2007.
-
(2007)
Proceedings of the Usable Security Workshop
-
-
Kuo, C.1
Walker, J.2
Perrig, A.3
-
16
-
-
85076475889
-
WiFi hitting the security camera scene
-
Articles, March
-
R. Li. WiFi hitting the security camera scene. eZine Articles, March 2010. http://ezinearticles.com/ ?id=3963601.
-
(2010)
EZine
-
-
Li, R.1
-
18
-
-
27544489075
-
Seeing-isbelieving: Using camera phones for human-verifiable authentication
-
Oakland, CA, May
-
J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-isbelieving: Using camera phones for human-verifiable authentication. In Proceedings of the 26th IEEE Symposium on Security and Privacy, Oakland, CA, May 2005.
-
(2005)
Proceedings of the 26th IEEE Symposium on Security and Privacy
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
19
-
-
85059951772
-
The way i see it: When security gets in the way
-
November-December
-
D. A. Norman. The way I see it: When security gets in the way. Interactions, 16(6), November-December 2009.
-
(2009)
Interactions
, vol.16
, Issue.6
-
-
Norman, D.A.1
-
20
-
-
56649111524
-
Simple and effective defense againgst evil twin access points
-
Alexandria, VA, March-April
-
V. Roth, W. Polak, E. Rieffel, and T. Turner. Simple and effective defense againgst evil twin access points. In Proceedings of the 1st ACM Conference on Wireless Network Security, Alexandria, VA, March-April 2008.
-
(2008)
Proceedings of the 1st ACM Conference on Wireless Network Security
-
-
Roth, V.1
Polak, W.2
Rieffel, E.3
Turner, T.4
-
25
-
-
85076471002
-
-
WiFi Alliance
-
WiFi Alliance. WPS Certified Products. http://www. wi-fi.org/search_products.php.
-
WPS Certified Products
-
-
|