Ensemble: cooperative proximity-based authentication
暂无分享,去创建一个
Eyal de Lara | Anthony LaMarca | Anmol Sheth | Adin Scannell | Andre Kalamandeen | A. LaMarca | Anmol Sheth | E. D. Lara | A. Scannell | Andre Kalamandeen
[1] John Krumm,et al. The NearMe Wireless Proximity Server , 2004, UbiComp.
[2] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[3] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[4] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[5] Kostas E. Bekris,et al. Robotics-Based Location Sensing Using Wireless Ethernet , 2002, MobiCom '02.
[6] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[7] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[8] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[9] Tim Kindberg,et al. Validating and Securing Spontaneous Associations between Wireless Devices , 2003, ISC.
[10] Gerd Kortuem,et al. A relative positioning system for co-located mobile devices , 2005, MobiSys '05.
[11] Alec Wolman,et al. Enabling new mobile applications with location proofs , 2009, HotMobile '09.
[12] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[13] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[14] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[17] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[18] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[19] Eyal de Lara,et al. Accurate GSM Indoor Localization , 2005, UbiComp.
[20] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.