메뉴 건너뛰기




Volumn , Issue , 2013, Pages 417-428

SafeSlinger: Easy-to-use and secure public-key exchange

Author keywords

Secure communication; Security privacy; Trust establishment

Indexed keywords

DESIGN AND IMPLEMENTATIONS; FILE EXCHANGE; INSTANT MESSAGES; LEAP OF FAITHS; ON-LINE COMMUNICATION; SECURE CHANNELS; SECURE COMMUNICATIONS; TRUST ESTABLISHMENT;

EID: 84887099940     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2500423.2500428     Document Type: Conference Paper
Times cited : (37)

References (37)
  • 2
    • 0034317075 scopus 로고    scopus 로고
    • Key-agreement in ad-hoc networks
    • Nov.
    • N. Asokan and P. Ginzboorg. Key-agreement in ad-hoc networks. Computer Communications, 23(17):1627-1637, Nov. 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 9
    • 77953853641 scopus 로고    scopus 로고
    • Shake them Up! A movement-based pairing protocol for CPU-constrained devices
    • C. Castelluccia and P. Mutaf. Shake Them Up! A movement-based pairing protocol for CPU-constrained devices. In Proceedings of ACM/Usenix MobiSys, 2005.
    • (2005) Proceedings of ACM/Usenix MobiSys
    • Castelluccia, C.1    Mutaf, P.2
  • 14
    • 3242657408 scopus 로고    scopus 로고
    • Group key agreement efficient in communication
    • July
    • Y. Kim, A. Perrig, and G. Tsudik. Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7):905-921, July 2004.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.7 , pp. 905-921
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 16
    • 56749103028 scopus 로고    scopus 로고
    • Mind your manners: Socially appropriate wireless key establishment for groups
    • Mar.
    • C. Kuo, A. Studer, and A. Perrig. Mind your manners: Socially appropriate wireless key establishment for groups. Proceedings of First ACM WiSec, Mar. 2008.
    • (2008) Proceedings of First ACM WiSec
    • Kuo, C.1    Studer, A.2    Perrig, A.3
  • 18
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • S. Laur and K. Nyberg. Efficient mutual data authentication using manually authenticated strings. In Cryptology and Network Security (CANS), pages 90-107, 2006.
    • (2006) Cryptology and Network Security (CANS) , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 20
    • 26444533861 scopus 로고    scopus 로고
    • Are you with me? - Using accelerometers to determine if two devices are carried by the same person
    • J. Lester, B. Hannaford, and B. Gaetano. Are you with me? - Using accelerometers to determine if two devices are carried by the same person. In Proceedings of Pervasive, 2004.
    • (2004) Proceedings of Pervasive
    • Lester, J.1    Hannaford, B.2    Gaetano, B.3
  • 22
    • 60149100977 scopus 로고    scopus 로고
    • revision v10r00, Aug
    • Linksky, J. et al. Simple Pairing Whitepaper, revision v10r00. http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/ SimplePairing-WP-V10r00.pdf, Aug. 2006.
    • (2006) Simple Pairing Whitepaper
    • Linksky, J.1
  • 24
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology (Crypto), pages 369-378, 1987.
    • (1987) Advances in Cryptology (Crypto) , pp. 369-378
    • Merkle, R.C.1
  • 26
    • 84877949393 scopus 로고    scopus 로고
    • Groupthink: Usability of secure group association for wireless devices
    • Sept.
    • R. Nithyanand, N. Saxena, G. Tsudik, and E. Uzun. Groupthink: Usability of secure group association for wireless devices. In Proceedings of Ubicomp, Sept. 2010.
    • (2010) Proceedings of Ubicomp
    • Nithyanand, R.1    Saxena, N.2    Tsudik, G.3    Uzun, E.4
  • 29
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, pages 172-194, 1999.
    • (1999) Security Protocols Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 32
    • 84855682684 scopus 로고    scopus 로고
    • Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement
    • A. Studer, T. Passaro, and L. Bauer. Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. In Proceedings of ACSAC, 2011.
    • (2011) Proceedings of ACSAC
    • Studer, A.1    Passaro, T.2    Bauer, L.3
  • 33
    • 84887044041 scopus 로고    scopus 로고
    • Dec.
    • Tor Project Team. https://www.torproject.org, Dec. 2007.
    • (2007) Tor Project Team
  • 35
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Advances in Cryptology (Crypto), pages 309-326, 2005.
    • (2005) Advances in Cryptology (Crypto) , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.