-
2
-
-
84979654615
-
-
August. http://august.com/.
-
-
-
-
5
-
-
33645995393
-
Device-enabled authorization in the grey system
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the grey system. In International Conference on Information Security, 2005.
-
(2005)
International Conference on Information Security
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
8
-
-
84870358706
-
CAP twelve years later: How the "rules" have changed
-
E. Brewer. CAP twelve years later: How the "rules" have changed. Computer, 2012.
-
(2012)
Computer
-
-
Brewer, E.1
-
9
-
-
79956094375
-
Body area networks: A survey
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung. Body area networks: A survey. Mobile networks and applications, 2011.
-
(2011)
Mobile Networks and Applications
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
10
-
-
84979705293
-
-
Danalock. http://www.danalock.com/.
-
-
-
-
11
-
-
84979689935
-
Empowering consumer electronic security and privacy choices: Navigating the modern home
-
T. Denning and T. Kohno. Empowering consumer electronic security and privacy choices: Navigating the modern home. In Symposium on Usable Privacy and Security (SOUPS), 2013.
-
(2013)
Symposium on Usable Privacy and Security (SOUPS)
-
-
Denning, T.1
Kohno, T.2
-
12
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
S. Drimer and S. J. Murdoch. Keep your enemies close: Distance bounding against smartcard relay attacks. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Drimer, S.1
Murdoch, S.J.2
-
13
-
-
84979675028
-
-
C. Ericsson. https://www.youtube.com/watch?v=pJ5fSWspBpo.
-
-
-
Ericsson, C.1
-
14
-
-
84979665035
-
-
N. Forum. http: //nfc-forum.org/what-is-nfc/about-the-technology/.
-
-
-
Forum, N.1
-
16
-
-
84888171353
-
Relay attacks on passive keyless entry and start systems in modern cars
-
A. Francillon, B. Danev, S. Capkun, S. Capkun, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS, 2011.
-
(2011)
NDSS
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
Capkun, S.4
Capkun, S.5
-
19
-
-
85010360950
-
-
Technical Report UCB/EECS-2016-11, EECS Department, University of California, Berkeley, Mar
-
G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner. Smart locks: Lessons for securing commodity internet of things devices. Technical Report UCB/EECS-2016-11, EECS Department, University of California, Berkeley, Mar 2016. URL: http://www.eecs.berkeley.edu/Pubs/TechRpts/2016/ EECS-2016-11.html.
-
(2016)
Smart Locks: Lessons for Securing Commodity Internet of Things Devices
-
-
Ho, G.1
Leung, D.2
Mishra, P.3
Hosseini, A.4
Song, D.5
Wagner, D.6
-
20
-
-
84979659894
-
-
Kevo. http://www.kwikset.com/kevo/default.aspx.
-
-
-
-
22
-
-
84878348593
-
Challenges in access right assignment for secure home networks
-
T. H.-J. Kim, L. Bauer, J. Newsome, A. Perrig, and J. Walker. Challenges in access right assignment for secure home networks. In HotSec, 2010.
-
(2010)
HotSec
-
-
Kim, T.H.-J.1
Bauer, L.2
Newsome, J.3
Perrig, A.4
Walker, J.5
-
23
-
-
79951723271
-
A survey on wireless body area networks
-
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester. A survey on wireless body area networks. Wireless Networks, 2011.
-
(2011)
Wireless Networks
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
25
-
-
84979683711
-
-
Lockitron. https://lockitron.com/.
-
-
-
-
27
-
-
84979662751
-
-
Mercedes-Benz. http://techcenter.mercedes-benz.com/ en/keylessgo/detail.html.
-
-
-
-
29
-
-
84979681139
-
-
Nest. https://nest.com/.
-
-
-
-
30
-
-
84979662748
-
-
Okidokeys. https://www.okidokeys.com/.
-
-
-
-
31
-
-
85045009213
-
From the aether to the ethernet-attacking the internet using broadcast digital television
-
Y. Oren and A. D. Keromytis. From the aether to the ethernet-attacking the internet using broadcast digital television. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Oren, Y.1
Keromytis, A.D.2
-
33
-
-
85084162948
-
Bluetooth: With low energy comes low security
-
M. Ryan. Bluetooth: With low energy comes low security. In WOOT, 2013.
-
(2013)
WOOT
-
-
Ryan, M.1
-
36
-
-
70450252080
-
Attacks on public WLAN-based positioning systems
-
N. O. Tippenhauer, K. B. Rasmussen, C. Popper, and S. Capkun. Attacks on public WLAN-based positioning systems. In Proceedings of the 7th International Conference on Mobile systems, applications, and services, 2009.
-
(2009)
Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services
-
-
Tippenhauer, N.O.1
Rasmussen, K.B.2
Popper, C.3
Capkun, S.4
-
39
-
-
84907902089
-
Osteoconduct: Wireless body-area communication based on bone conduction
-
L. Zhong, D. El-Daye, B. Kaufman, N. Tobaoda, T. Mohamed, and M. Liebschner. Osteoconduct: Wireless body-area communication based on bone conduction. In Proceedings of the ICST 2nd International Conference on Body Area Networks, 2007.
-
(2007)
Proceedings of the ICST 2nd International Conference on Body Area Networks
-
-
Zhong, L.1
El-Daye, D.2
Kaufman, B.3
Tobaoda, N.4
Mohamed, T.5
Liebschner, M.6
|