-
1
-
-
79960940984
-
Near field communication
-
R. Want, "Near field communication," Pervasive Computing, IEEE, vol. 10, pp. 4-7, 2011.
-
(2011)
Pervasive Computing, IEEE
, vol.10
, pp. 4-7
-
-
Want, R.1
-
2
-
-
84865294129
-
Near field communication: Introduction and implications
-
S. McHugh and K. Yarmey, "Near field communication: Introduction and implications," Journal of Web Librarianship, vol. 6, pp. 186-207, 2012.
-
(2012)
Journal of Web Librarianship
, vol.6
, pp. 186-207
-
-
McHugh, S.1
Yarmey, K.2
-
3
-
-
84885214025
-
Crowd++: Unsupervised speaker count with smartphones
-
C. Xu, S. Li, G. Liu, Y. Zhang, E. Miluzzo, Y.-F. Chen, J. Li, and B. Firner, "Crowd++: Unsupervised speaker count with smartphones," in ACM UbiComp, 2013.
-
(2013)
ACM UbiComp
-
-
Xu, C.1
Li, S.2
Liu, G.3
Zhang, Y.4
Miluzzo, E.5
Chen, Y.-F.6
Li, J.7
Firner, B.8
-
5
-
-
84855682684
-
Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement
-
A. Studer, T. Passaro, and L. Bauer, "Don't bump, shake on it: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement," in Proceedings of the 27th Annual Computer Security Applications Conference, 2011.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
-
-
Studer, A.1
Passaro, T.2
Bauer, L.3
-
6
-
-
84883068295
-
Near field authentication for smart devices
-
L. Li, X. Zhao, and G. Xue, "Near field authentication for smart devices," in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013.
-
(2013)
INFOCOM, 2013 Proceedings IEEE. IEEE
-
-
Li, L.1
Zhao, X.2
Xue, G.3
-
8
-
-
84923026523
-
-
Bump technologies.bump
-
"Bump technologies.bump." http: //bu.mp/.
-
-
-
-
9
-
-
38149059722
-
Key generation based on acceleration data of shaking processes
-
Springer, ser. LNCS, J. Krumm et al., Eds
-
D. Bichler, G. Stromberg, M. Huemer, and M. Low, "Key generation based on acceleration data of shaking processes," in UbiComp 2007: Ubiquitous Computing, ser. LNCS, J. Krumm et al., Eds., vol. 4717. Springer, 2007, p. 304317.
-
(2007)
UbiComp 2007: Ubiquitous Computing
, vol.4717
, pp. 304317
-
-
Bichler, D.1
Stromberg, G.2
Huemer, M.3
Low, M.4
-
10
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
ser. LNCS, A. LaMarca et al., Eds. Springer
-
R. Mayrhofer and H. Gellersen, "Shake well before use: Authentication based on accelerometer data," in Pervasive computing, ser. LNCS, A. LaMarca et al., Eds., vol. 4480. Springer, 2007, p. 144161.
-
(2007)
Pervasive Computing
, vol.4480
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
11
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-is-believing: Using camera phones for human-verifiable authentication," in Security and privacy, 2005 IEEE symposium on, 2005.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
13
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: Authentication in ad-hoc wireless networks," in NDSS, 2002.
-
(2002)
NDSS
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
14
-
-
84903725812
-
Privacy and authentication protocol for mobile rfid systems
-
B. Niu, X. Zhu, H. Chi, and H. Li, "Privacy and authentication protocol for mobile rfid systems," Wireless Personal Communications, pp. 1-19, 2014.
-
(2014)
Wireless Personal Communications
, pp. 1-19
-
-
Niu, B.1
Zhu, X.2
Chi, H.3
Li, H.4
-
15
-
-
84922972694
-
-
arXiv preprint arXiv: 1308.6805
-
J. Han, C. Qian, D. Ma, X. Wang, J. Zhao, P. Zhang, W. Xi, and Z. Jiang, "Twins: Device-free object tracking using passive tags," arXiv preprint arXiv: 1308.6805, 2013.
-
(2013)
Twins: Device-free Object Tracking Using Passive Tags
-
-
Han, J.1
Qian, C.2
Ma, D.3
Wang, X.4
Zhao, J.5
Zhang, P.6
Xi, W.7
Jiang, Z.8
-
16
-
-
84920054459
-
Cbid: A customer behavior identification system using passive tags
-
J. Han, D. Ma, C. Qian, W. Xi, W. Zhi, Z. Jiang, and S. Longfei, "Cbid: A customer behavior identification system using passive tags," in ICNP, 2014.
-
(2014)
ICNP
-
-
Han, J.1
Ma, D.2
Qian, C.3
Xi, W.4
Zhi, W.5
Jiang, Z.6
Longfei, S.7
-
17
-
-
0039864907
-
On longest increasing subsequences in random permutations
-
A. Odlyzko and E. Rains, "On longest increasing subsequences in random permutations," Contemporary Mathematics, vol. 251, pp. 439-452, 2000.
-
(2000)
Contemporary Mathematics
, vol.251
, pp. 439-452
-
-
Odlyzko, A.1
Rains, E.2
-
18
-
-
27144441097
-
An evaluation of statistical approaches to text categorization
-
Y. Yang, "An evaluation of statistical approaches to text categorization," Information retrieval, vol. 1, pp. 69-90, 1999.
-
(1999)
Information Retrieval
, vol.1
, pp. 69-90
-
-
Yang, Y.1
-
19
-
-
84923020617
-
Three different measures of sample skewness and kurtosis and their effects on the jarque-bera test for normality
-
P. Mantalos, "Three different measures of sample skewness and kurtosis and their effects on the jarque-bera test for normality," International Journal of Computational Economics and Econometrics, vol. 2, pp. 47-62, 2011.
-
(2011)
International Journal of Computational Economics and Econometrics
, vol.2
, pp. 47-62
-
-
Mantalos, P.1
-
21
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proceedings of the 14th ACM conference on Computer and communications security, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
23
-
-
84922999439
-
-
Free sound recorder 9.7.1
-
"Free sound recorder 9.7.1," http: //free-soundrecorder. updatestar.com/
-
-
-
|