-
1
-
-
84976295016
-
Distance-bounding protocols
-
Helleseth, T. (ed.), Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
-
(1994)
EUROCRYPT 1993. LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
2
-
-
0035478854
-
Random forests. Mach
-
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
-
(2001)
Learn
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
3
-
-
84916618330
-
-
Sensirion preps multi-gas sensor ‘nose’ for smartphones
-
Clarke, P.: Sensirion preps multi-gas sensor ‘nose’ for smartphones. http://www.electronics-eetimes.com/en/sensirion-preps-multi-gas-sensor-nose-for-smartphones.html?cmp id=7&news id=222919117
-
-
-
Clarke, P.1
-
5
-
-
84869430752
-
Strengthening user authentication through opportunistic cryptographic identity assertions
-
ACM, New York
-
Czeskis, A., Dietz, M., Kohno, T., Wallach, D., Balfanz, D.: Strengthening user authentication through opportunistic cryptographic identity assertions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. CCS ’12, pp. 404–414. ACM, New York (2012)
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security. CCS ’12
, pp. 404-414
-
-
Czeskis, A.1
Dietz, M.2
Kohno, T.3
Wallach, D.4
Balfanz, D.5
-
6
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
Pomerance, Carl (ed.), Springer, Heidelberg
-
Desmedt, Y., Goutier, C., Bengio, S.: Special uses and abuses of the Fiat-Shamir passport protocol. In: Pomerance, Carl (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21–39. Springer, Heidelberg (1988)
-
(1988)
CRYPTO 1987. LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
7
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–207 (1983)
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-207
-
-
Dolev, D.1
Yao, A.C.-C.2
-
8
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
August
-
Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: 16th USENIX Security Symposium, August 2007
-
(2007)
16th USENIX Security Symposium
-
-
Drimer, S.1
Murdoch, S.J.2
-
9
-
-
80054793984
-
-
Report 2010/332
-
Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. Cryptology ePrint Archive, Report 2010/332 (2010).http://eprint.iacr.org/
-
(2010)
Relay attacks on passive keyless entry and start systems in modern cars. Cryptology ePrint Archive,
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
10
-
-
78650216365
-
Practical NFC peer-to-peer relay attack using mobile phones
-
Ors Yalcin, S.B. (ed.), Springer, Heidelberg
-
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010)
-
(2010)
RFIDSec 2010. LNCS
, vol.6370
, pp. 35-49
-
-
Francis, L.1
Hancke, G.2
Mayes, K.3
Markantonakis, K.4
-
11
-
-
84865611928
-
Secure proximity detection for NFC devices based on ambient sensor data
-
Foresti, S., Yung, M., Martinelli, F. (eds.), Springer, Heidelberg
-
Halevi, T., Ma, D., Saxena, N., Xiang, T.: Secure proximity detection for NFC devices based on ambient sensor data. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 379–396. Springer, Heidelberg (2012)
-
(2012)
ESORICS 2012. LNCS
, vol.7459
, pp. 379-396
-
-
Halevi, T.1
Ma, D.2
Saxena, N.3
Xiang, T.4
-
12
-
-
76749092270
-
The weka data mining software: An update. SIGKDD Explor
-
Hall, M., et al.: The weka data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10–18 (2009)
-
(2009)
Newsl
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
-
13
-
-
33751067978
-
Practical attacks on proximity identification systems (short paper)
-
Hancke, G.: Practical attacks on proximity identification systems (short paper). In: IEEE Symposium on Security and Privacy (2006)
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Hancke, G.1
-
16
-
-
35048862771
-
The NearMe wireless proximity server
-
Mynatt, E.D., Siio, I. (eds.), Springer, Heidelberg
-
Krumm, J., Hinckley, K.: The NearMe wireless proximity server. In: Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 283–300. Springer, Heidelberg (2004)
-
(2004)
UbiComp 2004. LNCS
, vol.3205
, pp. 283-300
-
-
Krumm, J.1
Hinckley, K.2
-
18
-
-
85150485002
-
Location privacy via private proximity testing
-
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium. NDSS (2011)
-
(2011)
Proceedings of the Network and Distributed System Security Symposium. NDSS
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
19
-
-
84866565641
-
Pattern-based alignment of audio data for ad hoc secure device pairing
-
IEEE
-
Nguyen, N., Sigg, S., Huynh, A., Ji, Y.: Pattern-based alignment of audio data for ad hoc secure device pairing. In: 16th International Symposium on Wearable Computers. ISWC, pp. 88–91. IEEE (2012)
-
(2012)
16th International Symposium on Wearable Computers. ISWC
, pp. 88-91
-
-
Nguyen, N.1
Sigg, S.2
Huynh, A.3
Ji, Y.4
-
20
-
-
84861542091
-
Using ambient audio in secure mobile phone communication
-
IEEE
-
Nguyen, N., Sigg, S., Huynh, A., Ji, Y.: Using ambient audio in secure mobile phone communication. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 431–434. IEEE (2012)
-
(2012)
2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops
, pp. 431-434
-
-
Nguyen, N.1
Sigg, S.2
Huynh, A.3
Ji, Y.4
-
21
-
-
84916618328
-
-
National Oceanic and Atmospheric Administration: Pressure altitude
-
National Oceanic and Atmospheric Administration: Pressure altitude. http://www.wrh.noaa.gov/slc/projects/wxcalc/formulas/pressureAltitude.pdf
-
-
-
-
22
-
-
0035410882
-
Choosing a humidity sensor: A review of three technologies this discussion of the operating principles of capacitive, resisitive, and thermal conductivity humidity sensors also addresses their advantages, disadvantages, and applications. Sensors -
-
Roveti, D.K.: Choosing a humidity sensor: a review of three technologies this discussion of the operating principles of capacitive, resisitive, and thermal conductivity humidity sensors also addresses their advantages, disadvantages, and applications. Sensors - J. Appl. Sensing Technol. 18(7), 54–58 (2001)
-
(2001)
J. Appl. Sensing Technol
, vol.18
, Issue.7
, pp. 54-58
-
-
Roveti, D.K.1
-
23
-
-
84916618327
-
-
Sensordrone-control, March
-
Rudolph, M.: Sensordrone-control, March 2013. https://github.com/Sensorcon/Sensordrone-Control
-
(2013)
-
-
Rudolph, M.1
-
24
-
-
84871819678
-
Secure communication based on ambient audio
-
Schurmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE Trans. Mob. Comput. 12(2), 358–370 (2013)
-
(2013)
IEEE Trans. Mob. Comput
, vol.12
, Issue.2
, pp. 358-370
-
-
Schurmann, D.1
Sigg, S.2
-
25
-
-
84916607055
-
-
Sensordrone. Sensorcon, Sensordrone, preliminary specifications, rev. d, November
-
Sensordrone. Sensorcon: Sensordrone, preliminary specifications, rev. d: Specifications & user guide, November 2012. http://developer.sensordrone.com/forum/download/file.php?id=10
-
(2012)
Specifications & user guide
-
-
-
26
-
-
84916618326
-
-
10 environmental sensors that go along with you, February
-
Treacy, M.: 10 environmental sensors that go along with you, February 2009. http://www.treehugger.com/clean-technology/environmental-sensors.html
-
(2009)
-
-
Treacy, M.1
-
27
-
-
84901351388
-
Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
-
Truong, H.T.T., Gao, X., Shrestha, B., Saxena, N., Asokan, N., Nurmi, P.: Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. In: IEEE International Conference on Pervasive Computing and Communications. PerCom (2014)
-
(2014)
IEEE International Conference on Pervasive Computing and Communications. PerCom
-
-
Truong, H.T.T.1
Gao, X.2
Shrestha, B.3
Saxena, N.4
Asokan, N.5
Nurmi, P.6
-
28
-
-
84897662691
-
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks. Dec
-
Urien, P., Piramuthu, S.: Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks. Dec. Support Syst. 59, 28–36 (2014)
-
(2014)
Support Syst
, vol.59
, pp. 28-36
-
-
Urien, P.1
Piramuthu, S.2
-
29
-
-
38349004892
-
Amigo: Proximity-based authentication of mobile devices
-
In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.), Springer, Heidelberg
-
Varshavsky, A., Scannell, A., LaMarca, A., de Lara, E.: Amigo: proximity-based authentication of mobile devices. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 253–270. Springer, Heidelberg (2007)
-
(2007)
UbiComp 2007. LNCS
, vol.4717
, pp. 253-270
-
-
Varshavsky, A.1
Scannell, A.2
Lamarca, A.3
De Lara, E.4
-
30
-
-
0034247206
-
Multiboosting: A technique for combining boosting and wagging. Mach
-
Webb, G.I.: Multiboosting: a technique for combining boosting and wagging. Mach. Learn. 40(2), 159–196 (2000)
-
(2000)
Learn
, vol.40
, Issue.2
, pp. 159-196
-
-
Webb, G.I.1
-
31
-
-
84939726592
-
An exact expression for the thermal variation of the emitter base voltage of bi-polar transistors. Proc
-
Widlar, R.: An exact expression for the thermal variation of the emitter base voltage of bi-polar transistors. Proc. IEEE 55(1), 96–97 (1967)
-
(1967)
IEEE
, vol.55
, Issue.1
, pp. 96-97
-
-
Widlar, R.1
-
32
-
-
84916618325
-
-
Smartphone sensing: what sensors would we like to have in the future smartphones?
-
Yurish, S.: Smartphone sensing: what sensors would we like to have in the future smartphones? http://www.iaria.org/conferences2012/filesSENSORDEVICES12/Yurish Smartphone Sensing.pdf
-
-
-
Yurish, S.1
|