메뉴 건너뛰기




Volumn , Issue , 2014, Pages 880-891

Context-based zero-interaction pairing and key evolution for advanced personal devices

Author keywords

Context based pairing; Contextual security; Zero interaction

Indexed keywords

WEARABLE TECHNOLOGY;

EID: 84910661619     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660334     Document Type: Conference Paper
Times cited : (125)

References (22)
  • 3
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • C. Dwork, editor, volume 4117 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
    • Y. Dodis, J. Katz, L. Reyzin, and A. Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. In C. Dwork, editor, Advances in Cryptology - CRYPTO 2006, volume 4117 of Lecture Notes in Computer Science, pages 232-250. Springer Berlin Heidelberg, 2006.
    • (2006) Advances in Cryptology - CRYPTO 2006 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 5
    • 84911939183 scopus 로고    scopus 로고
    • Key establishment in constrained devices. Graduate seminar paper in T-110.7290
    • Oct.
    • J.-E. Ekberg. Key establishment in constrained devices. graduate seminar paper in T-110.7290 - Research Seminar on Network Security, Oct. 2006. http://www.tcs.hut.fi/Studies/T-79.7001/2006AUT/seminar-papers/Ekberg-paper-final.pdf.
    • (2006) Research Seminar on Network Security
    • Ekberg, J.-E.1
  • 10
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Feb.
    • D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41-77, Feb. 2005.
    • (2005) ACM Trans. Inf. Syst. Secur. , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 14
    • 84937867632 scopus 로고    scopus 로고
    • [Referenced 2014-04-28]
    • Quirky. Spotter multipurpose sensor, 2014. https://www.quirky.com/shop/609-spotter-multi-purpose-sensor [Referenced 2014-04-28].
    • (2014) Spotter Multipurpose Sensor
    • Quirky1
  • 16
  • 17
    • 38149072454 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, volume 4572 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
    • J. Suomalainen, J. Valkonen, and N. Asokan. Security associations in personal networks: A comparative analysis. In F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks, volume 4572 of Lecture Notes in Computer Science, pages 43-57. Springer Berlin Heidelberg, 2007.
    • (2007) Security and Privacy in Ad-hoc and Sensor Networks , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 20
    • 38349004892 scopus 로고    scopus 로고
    • Amigo: Proximity-based authentication of mobile devices
    • J. Krumm, G. Abowd, A. Seneviratne, and T. Strang, editors, volume 4717 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
    • A. Varshavsky, A. Scannell, A. LaMarca, and E. Lara. Amigo: Proximity-based authentication of mobile devices. In J. Krumm, G. Abowd, A. Seneviratne, and T. Strang, editors, UbiComp 2007: Ubiquitous Computing, volume 4717 of Lecture Notes in Computer Science, pages 253-270. Springer Berlin Heidelberg, 2007.
    • (2007) UbiComp 2007: Ubiquitous Computing , pp. 253-270
    • Varshavsky, A.1    Scannell, A.2    Lamarca, A.3    Lara, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.