-
1
-
-
33745837743
-
Password-based group key exchange in a constant number of rounds
-
M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval. Password-based group key exchange in a constant number of rounds. In Public Key Cryptography, pages 427-442, 2006.
-
(2006)
Public Key Cryptography
, pp. 427-442
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Pointcheval, D.4
-
2
-
-
0034317075
-
Key-agreement in ad-hoc networks
-
Nov.
-
N. Asokan and P. Ginzboorg. Key-agreement in ad-hoc networks. Computer Communications, 23(17):1627-1637, Nov. 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
5
-
-
20444490057
-
Off-the-record communication, or, why not to use PGP
-
ACM
-
N. Borisov, I. Goldberg, and E. Brewer. Off-the-record communication, or, why not to use PGP. In Proceedings of ACM Workshop on Privacy in the Electronic Society, pages 77-84. ACM, 2004.
-
(2004)
Proceedings of ACM Workshop on Privacy in the Electronic Society
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
9
-
-
77953853641
-
Shake them Up! A movement-based pairing protocol for CPU-constrained devices
-
C. Castelluccia and P. Mutaf. Shake Them Up! A movement-based pairing protocol for CPU-constrained devices. In Proceedings of ACM/Usenix MobiSys, 2005.
-
(2005)
Proceedings of ACM/Usenix MobiSys
-
-
Castelluccia, C.1
Mutaf, P.2
-
10
-
-
78650421160
-
Gangs: Gather authenticate 'n group securely
-
Sept.
-
C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu. GAnGS: Gather authenticate 'n group securely. In Proceedings of ACM MobiCom, Sept. 2008.
-
(2008)
Proceedings of ACM MobiCom
-
-
Chen, C.-H.O.1
Chen, C.-W.2
Kuo, C.3
Lai, Y.-H.4
McCune, J.M.5
Studer, A.6
Perrig, A.7
Yang, B.-Y.8
Wu, T.-C.9
-
13
-
-
0742293892
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Proceedings of Ubicomp, 2001.
-
(2001)
Proceedings of Ubicomp
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
14
-
-
3242657408
-
Group key agreement efficient in communication
-
July
-
Y. Kim, A. Perrig, and G. Tsudik. Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7):905-921, July 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.7
, pp. 905-921
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
15
-
-
3142512728
-
Tree-based group key agreement
-
May
-
Y. Kim, A. Perrig, and G. Tsudik. Tree-based group key agreement. ACM Transactions on Information Systems Security, 7(1):60-96, May 2004.
-
(2004)
ACM Transactions on Information Systems Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
16
-
-
56749103028
-
Mind your manners: Socially appropriate wireless key establishment for groups
-
Mar.
-
C. Kuo, A. Studer, and A. Perrig. Mind your manners: Socially appropriate wireless key establishment for groups. Proceedings of First ACM WiSec, Mar. 2008.
-
(2008)
Proceedings of First ACM WiSec
-
-
Kuo, C.1
Studer, A.2
Perrig, A.3
-
18
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
S. Laur and K. Nyberg. Efficient mutual data authentication using manually authenticated strings. In Cryptology and Network Security (CANS), pages 90-107, 2006.
-
(2006)
Cryptology and Network Security (CANS)
, pp. 90-107
-
-
Laur, S.1
Nyberg, K.2
-
20
-
-
26444533861
-
Are you with me? - Using accelerometers to determine if two devices are carried by the same person
-
J. Lester, B. Hannaford, and B. Gaetano. Are you with me? - Using accelerometers to determine if two devices are carried by the same person. In Proceedings of Pervasive, 2004.
-
(2004)
Proceedings of Pervasive
-
-
Lester, J.1
Hannaford, B.2
Gaetano, B.3
-
21
-
-
70450239642
-
SPATE: Small-group PKI-less authenticated trust establishment
-
June
-
Y.-H. Lin, A. Studer, H.-C. Hsiao, J. M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang. SPATE: Small-group PKI-less authenticated trust establishment. In Proceedings of ACM/Usenix MobiSys, June 2009.
-
(2009)
Proceedings of ACM/Usenix MobiSys
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
22
-
-
60149100977
-
-
revision v10r00, Aug
-
Linksky, J. et al. Simple Pairing Whitepaper, revision v10r00. http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/ SimplePairing-WP-V10r00.pdf, Aug. 2006.
-
(2006)
Simple Pairing Whitepaper
-
-
Linksky, J.1
-
24
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology (Crypto), pages 369-378, 1987.
-
(1987)
Advances in Cryptology (Crypto)
, pp. 369-378
-
-
Merkle, R.C.1
-
25
-
-
84887108160
-
Ho-po key: Leveraging physical constraints on human motion to authentically exchange information in a group
-
Dec.
-
G. Mezzour, A. Studer, M. Farb, J. Lee, J. McCune, H.-C. Hsiao, and A. Perrig. Ho-Po Key: Leveraging physical constraints on human motion to authentically exchange information in a group. Technical Report CMU-CyLab-11-004, CyLab, Carnegie Mellon University, Dec. 2010.
-
(2010)
Technical Report CMU-CyLab-11-004, CyLab, Carnegie Mellon University
-
-
Mezzour, G.1
Studer, A.2
Farb, M.3
Lee, J.4
McCune, J.5
Hsiao, H.-C.6
Perrig, A.7
-
29
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, pages 172-194, 1999.
-
(1999)
Security Protocols Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
31
-
-
0034247455
-
Key agreement in dynamic peer groups
-
Aug.
-
M. Steiner, G. Tsudik, and M. Waidner. Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769-780, Aug. 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
32
-
-
84855682684
-
Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement
-
A. Studer, T. Passaro, and L. Bauer. Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. In Proceedings of ACSAC, 2011.
-
(2011)
Proceedings of ACSAC
-
-
Studer, A.1
Passaro, T.2
Bauer, L.3
-
33
-
-
84887044041
-
-
Dec.
-
Tor Project Team. https://www.torproject.org, Dec. 2007.
-
(2007)
Tor Project Team
-
-
-
35
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Advances in Cryptology (Crypto), pages 309-326, 2005.
-
(2005)
Advances in Cryptology (Crypto)
, pp. 309-326
-
-
Vaudenay, S.1
|