Ripple: Communicating through Physical Vibration
暂无分享,去创建一个
[1] H. Noma,et al. Vibrotactile Apparent Movement by DC Motors and Voice-coil Tactors , 2004 .
[2] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[3] Nitesh Saxena,et al. On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping , 2010, CCS '10.
[4] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[5] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[6] Vitaly Shmatikov,et al. Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 , 2011, CCS.
[7] A. Engel,et al. Pulse Width Modulation , 2000 .
[8] Heekuck Oh,et al. Conditional privacy preserving security protocol for NFC applications , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).
[9] Lakshminarayanan Subramanian,et al. Hermes: data transmission over unknown voice channels , 2010, MobiCom.
[10] G. Cox,et al. ~ " " " ' l I ~ " " -" . : -· " J , 2006 .
[11] A. Quazi,et al. Underwater acoustic communications , 1982, IEEE Communications Magazine.
[12] Ellen Yi-Luen Do,et al. PianoTouch: A wearable haptic piano instruction system for passive learning of piano skills , 2008, 2008 12th IEEE International Symposium on Wearable Computers.
[13] Lee Freitag,et al. Harvesting time-frequency-space diversity with coded modulation for underwater acoustic communications , 2009 .
[14] Lujo Bauer,et al. Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement , 2011, ACSAC '11.
[15] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] Blake Hannaford,et al. "Are You with Me?" - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person , 2004, Pervasive.
[17] R. S. Pedersen. Audible noise reduction , 1976 .
[18] Ernst Haselsteiner. Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .
[19] R. Krishnan,et al. Electric Motor Drives: Modeling, Analysis, and Control , 2001 .
[20] John Kenneth Salisbury,et al. Haptic Feedback Enhances Force Skill Learning , 2007, Second Joint EuroHaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (WHC'07).
[21] Nitesh Saxena,et al. Authentication technologies for the blind or visually impaired , 2009 .
[22] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[23] John R. Brauer. Magnetic Actuators and Sensors , 2006 .
[24] Frank Tendick,et al. Haptic guidance: experimental evaluation of a haptic training method for a perceptual motor skill , 2002, Proceedings 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. HAPTICS 2002.
[25] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[26] Youngjun Cho,et al. A New Miniature Smart Actuator based on Piezoelectric material and Solenoid for Mobile Devices , 2010 .
[27] Manish Giri,et al. Theoretical Analysis of User Authentication Systems , 2013 .
[28] Frédo Durand,et al. The visual microphone , 2014, ACM Trans. Graph..
[29] Ramarathnam Venkatesan,et al. Dhwani: secure peer-to-peer acoustic NFC , 2013, SIGCOMM.
[30] Collin Mulliner,et al. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.
[31] Takuro Yonezawa,et al. Vib-Connect: A Device Collaboration Interface Using Vibration , 2011, 2011 IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications.
[32] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[33] Junggab Son,et al. Conditional privacy preserving security protocol for NFC applications , 2013, IEEE Transactions on Consumer Electronics.
[34] Johann A. Briffa,et al. Eavesdropping near-field contactless payments: a quantitative analysis , 2013 .
[35] T. W. C. Brown,et al. Evaluating the eavesdropping range of varying magnetic field strengths in NFC standards , 2013, 2013 7th European Conference on Antennas and Propagation (EuCAP).
[36] Songhwai Oh,et al. Privacy-Aware Communication for Smartphones Using Vibration , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.