-
1
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
Oakland, CA, USA
-
Halperin, D., Heydt-Benjamin, T.S., Ransford, B., et al.: 'Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses'. Proc. IEEE SP 08, Oakland, CA, USA, 2008, pp. 129-142
-
(2008)
Proc. IEEE SP 08
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
-
2
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Christianson, B., Crispo, B., Malcolm, J. A., Roe, M. (Eds.), (LNCS, 1976) (Springer)
-
Stajano, F., Anderson, R.: 'The resurrecting duckling: security issues for ad-hoc wireless networks', in Christianson, B., Crispo, B., Malcolm, J. A., Roe, M. (Eds.): 'Security protocols workshop' (LNCS, 1976) (Springer, 1999), pp. 172-194
-
(1999)
Security Protocols Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
3
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
McCune, J.M., Perrig, A., Reiter, M.K.: 'Seeing-is-believing: using camera phones for human-verifiable authentication'. Proc. IEEE SP 05, Oakland, CA, USA, 2005, pp. 110-124 (Pubitemid 41543650)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
4
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Oakland, CA, USA
-
Saxena, N., Ekberg, J.E., Kostiainen, K., Asokan, N.: 'Secure device pairing based on a visual channel'. Proc. IEEE SP 06, Oakland, CA, USA, 2006, pp. 306-313
-
(2006)
Proc. IEEE SP 06
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.E.2
Kostiainen, K.3
Asokan, N.4
-
5
-
-
78650421160
-
GAnGS: Gather, authenticate'n group securely
-
San Francisco, CA, USA
-
Chen, C.H.O., Chen, C.W., Kuo, C., et al.: 'GAnGS: gather, authenticate'n group securely'. Proc. ACM MobiCom 08, San Francisco, CA, USA, 2008, pp. 92-103
-
(2008)
Proc. ACM MobiCom 08
, pp. 92-103
-
-
Chen, C.H.O.1
Chen, C.W.2
Kuo, C.3
-
6
-
-
78049520643
-
Spate: Small-group PKI-less authenticated trust establishment
-
Lin, Y.H., Studer, A., Chen, Y.H., et al.: 'Spate: small-group pki-less authenticated trust establishment', IEEE Trans. Mob. Comput., 2010, 9, (12), pp. 1666-1681
-
(2010)
IEEE Trans. Mob. Comput.
, vol.9
, Issue.12
, pp. 1666-1681
-
-
Lin, Y.H.1
Studer, A.2
Chen, Y.H.3
-
7
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: 'Loud and clear: human-verifiable authentication based on audio'. Proc. IEEE ICDCS 06, Lisboa, Portugal, 2006, p. 10
-
(2006)
Proc. IEEE ICDCS 06
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
8
-
-
56649100493
-
HAPADEP: Human-assisted pure audio device pairing
-
Wu, T.C., Lei, C.L., Rijmen, V., Lee, D.T. (Eds.), (LNCS, 5222) (Springer)
-
Soriente, C., Tsudik, G., Uzun, E.: 'HAPADEP: human-assisted pure audio device pairing', in Wu, T.C., Lei, C.L., Rijmen, V., Lee, D.T. (Eds.): 'Information security' (LNCS, 5222) (Springer, 2008), pp. 385-400
-
(2008)
Information Security
, pp. 385-400
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
9
-
-
24644483295
-
Exploiting empirical engagement in authentication protocol design
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
Creese, S.J., Goldsmith, M.H., Harrison, R., Roscoe, A.W., Whittaker, P., Zakiuddin, I.: 'Exploiting empirical engagement in authentication protocol design', in Hutter, D., Ullmann, M. (Eds.): 'Security in pervasive computing' (LNCS, 3450) (Springer, 2005), pp. 119-133 (Pubitemid 41274198)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 119-133
-
-
Creese, S.1
Goldsmith, M.2
Harrison, R.3
Roscoe, B.4
Whittaker, P.5
Zakiuddin, I.6
-
10
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, USA
-
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: 'Talking to strangers: authentication in ad-hoc wireless networks'. Proc. NDSS 02, San Diego, CA, USA, 2002, pp. 7-19
-
(2002)
Proc. NDSS 02
, pp. 7-19
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
11
-
-
24644434353
-
Security in personal area networks
-
Mitchell, C.J. (Ed.), (IEE Press), 1st edn.
-
Gehrmann, C., Nyberg, K.: 'Security in personal area networks', in Mitchell, C.J. (Ed.): 'Security for mobility', (IEE Press, 2004, 1st edn.), pp. 191-230
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
12
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Vaudenay, S.: 'Secure communications over insecure channels based on short authenticated strings', in Shoup, V. (Ed.): 'Advances in cryptology-CRYPTO 2005' (LNCS, 3621) (Springer, 2005), pp. 309-326 (Pubitemid 43902121)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
13
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
DOI 10.1109/JPROC.2005.862475
-
Cagalj, M., Capkun, S., Hubaux, J.P.: 'Key agreement in peer-to-peer wireless networks', Proc. IEEE, 2006, 94, (2), pp. 467-478 (Pubitemid 43145998)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
14
-
-
35348851489
-
Multichannel security protocols
-
DOI 10.1109/MPRV.2007.76
-
Wong, F.L., Stajano, F.: 'Multichannel security protocols', IEEE Pervasive Comput., 2007, 6, (4), pp. 31-39 (Pubitemid 47594392)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 31-39
-
-
Wong, F.L.1
Stajano, F.2
-
15
-
-
40149095729
-
Authenticating ad hoc networks by comparison of short digests
-
Nguyen, L.H., Roscoe, A.W.: 'Authenticating ad hoc networks by comparison of short digests', Inf. Comput., 2008, 206, (2-4), pp. 250-271
-
(2008)
Inf. Comput.
, vol.206
, Issue.2-4
, pp. 250-271
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
16
-
-
79951833159
-
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
-
Nguyen, L.H., Roscoe, A.W.: 'Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey', J. Comput. Sec., 2011, 19, (1), pp. 139-201
-
(2011)
J. Comput. Sec.
, vol.19
, Issue.1
, pp. 139-201
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
17
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: 'SPINS: security protocols for sensor networks', Wirel. Netw., 2002, 8, (5), pp. 521-534
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
18
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
Eschenauer, L., Gligor, V.D.: 'A key-management scheme for distributed sensor networks'. Proc. ACM CCS 02, Washington, DC, USA, 2002, pp. 41-47
-
(2002)
Proc. ACM CCS 02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
19
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, USA
-
Chan, H.W., Perrig, A., Song, D.: 'Random key predistribution schemes for sensor networks'. Proc. IEEE SP 03, Oakland, CA, USA, 2003, pp. 197
-
(2003)
Proc. IEEE SP 03
, pp. 197
-
-
Chan, H.W.1
Perrig, A.2
Song, D.3
-
20
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: 'A pairwise key predistribution scheme for wireless sensor networks', ACM Trans. Inf. Syst. Sec., 2005, 8, (2), pp. 228-258 (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
21
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
-
Malan, D.J., Welsh, M., Smith, M.D.: 'A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography'. Proc. IEEE SECON 2004, Santa Clara, CA, USA, 2004, pp. 71-80 (Pubitemid 40789266)
-
(2004)
2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
22
-
-
1542286901
-
Fast authenticated key establishment protocols for self-organizing sensor networks
-
San Diego, CA, USA
-
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: 'Fast authenticated key establishment protocols for self-organizing sensor networks'. Proc. ACM WSNA 03, San Diego, CA, USA, 2003, pp. 141-150
-
(2003)
Proc. ACM WSNA 03
, pp. 141-150
-
-
Huang, Q.1
Cukier, J.2
Kobayashi, H.3
Liu, B.4
Zhang, J.5
-
24
-
-
0242443794
-
Weak duplicate address detection in mobile ad hoc networks
-
Lausanne, Switzerland
-
Vaidya, N.H.: 'Weak duplicate address detection in mobile ad hoc networks'. Proc. ACM MobiHoc 02, Lausanne, Switzerland, 2002, pp. 206-216
-
(2002)
Proc. ACM MobiHoc 02
, pp. 206-216
-
-
Vaidya, N.H.1
-
26
-
-
0036343588
-
MANETconf: Configuration of hosts in a mobile ad hoc network
-
New York, USA
-
Nesargi, S., Prakash, R.: 'MANETconf: configuration of hosts in a mobile ad hoc network'. Proc. IEEE INFOCOM 2002, New York, USA, 2002, pp. 1059-1068
-
(2002)
Proc. IEEE INFOCOM 2002
, pp. 1059-1068
-
-
Nesargi, S.1
Prakash, R.2
-
27
-
-
0035789246
-
Distributed assignment of encoded MAC addresses in sensor networks
-
Long Beach, CA, USA
-
Schurgers, C., Kulkarni, G., Srivastava, M.B.: 'Distributed assignment of encoded MAC addresses in sensor networks'. Proc. ACM MobiHoc 01, Long Beach, CA, USA, 2001, pp. 295-298
-
(2001)
Proc. ACM MobiHoc 01
, pp. 295-298
-
-
Schurgers, C.1
Kulkarni, G.2
Srivastava, M.B.3
-
28
-
-
0036807078
-
Distributed on-demand address assignment in wireless sensor networks
-
DOI 10.1109/TPDS.2002.1041881
-
Schurgers, C., Kulkarni, G., Srivastava, M.B.: 'Distributed on-demand address assignment in wireless sensor networks', IEEE Trans. Parallel Distrib. Syst., 2002, 13, (10), pp. 1056-1065 (Pubitemid 35327422)
-
(2002)
IEEE Transactions on Parallel and Distributed Systems
, vol.13
, Issue.10
, pp. 1056-1065
-
-
Schurgers, C.1
Kulkarni, G.2
Srivastava, M.B.3
-
29
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.: 'On the security of public key protocols', IEEE Trans. Inf. Theory, 1983, 29, (2), pp. 198-208
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
30
-
-
46149087550
-
Cross-level sensor network simulation with cooja
-
Tampa, FL, USA
-
Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: 'Cross-level sensor network simulation with cooja'. Proc. IEEE LCN 06, Tampa, FL, USA, 2006, pp. 641-648
-
(2006)
Proc. IEEE LCN 06
, pp. 641-648
-
-
Osterlind, F.1
Dunkels, A.2
Eriksson, J.3
Finne, N.4
Voigt, T.5
-
31
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
St. Louis, MO, USA
-
Liu, A., Ning, P.: 'TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks'. Proc. IEEE IPSN 08, St. Louis, MO, USA, 2008, pp. 245-256
-
(2008)
Proc. IEEE IPSN 08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
|