-
1
-
-
84871732556
-
Key generation based on acceleration data of shaking processes
-
J. Krumm, editor
-
D. Bichler, G. Stromberg, M. Huemer, and M. Loew. Key generation based on acceleration data of shaking processes. In J. Krumm, editor, Proceedings of the 9th International Conference on Ubiquitous Computing, 2007.
-
Proceedings of the 9th International Conference on Ubiquitous Computing, 2007
-
-
Bichler, D.1
Stromberg, G.2
Huemer, M.3
Loew, M.4
-
2
-
-
29344434429
-
A review of audio fingerprinting
-
P. Cano, E. Batlle, T. Kalker, and J. Haitsma. A review of audio fingerprinting. Journal of VLSI Signal Processing Systems, 41 Issue 3, 2005.
-
(2005)
Journal of VLSI Signal Processing Systems
, vol.41
, Issue.3
-
-
Cano, P.1
Batlle, E.2
Kalker, T.3
Haitsma, J.4
-
3
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006.
-
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
5
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
L. E. Holmquist, F. Mattern, B. Schiele, P. Schiele, P. Alahuhta, M. Beigl, and H. W. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Proceedings of the 3rd International Conference on Ubiquitous Computing, 2001.
-
Proceedings of the 3rd International Conference on Ubiquitous Computing, 2001
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Schiele, P.4
Alahuhta, P.5
Beigl, M.6
Gellersen, H.W.7
-
7
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
ACM
-
S. Mathur, R. D. Miller, A. Varshavsky,W. Trappe, and N. B. Mandayam. Proximate: proximity-based secure pairing using ambient wireless signals. In MobiSys. ACM, 2011.
-
(2011)
MobiSys
-
-
Mathur, S.1
Miller, R.D.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.B.5
-
8
-
-
84866540481
-
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
-
R. Mayrhofer. The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. Security and Privacy in Ad-hoc and Sensor Networks, 2007.
-
(2007)
Security and Privacy in Ad-hoc and Sensor Networks
-
-
Mayrhofer, R.1
-
9
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. Pervasive Computing, pages 144-161, 2007.
-
(2007)
Pervasive Computing
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
12
-
-
0003851399
-
-
John Wiley and Sons, Inc., 2 edition
-
B. Schneider. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley and Sons, Inc., 2 edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneider, B.1
-
14
-
-
0019887799
-
Identification of common molecular subsequences
-
Mar.
-
T. F. Smith and M. S. Waterman. Identification of common molecular subsequences. Journal of molecular biology, 147(1):195-197, Mar. 1981.
-
(1981)
Journal of Molecular Biology
, vol.147
, Issue.1
, pp. 195-197
-
-
Smith, T.F.1
Waterman, M.S.2
|