Vibration-based Key Exchange among Multiple Smart Devices on the Desk
暂无分享,去创建一个
[1] Di Ma,et al. Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks , 2013, IEEE Transactions on Emerging Topics in Computing.
[2] Pascal Urien,et al. Identity-Based Authentication to Address Relay Attacks in Temperature Sensor-enabled Smartcards , 2013 .
[3] Yao Liu,et al. Fingerprinting Far Proximity from Radio Emissions , 2014, ESORICS.
[4] Nigel P. Smart,et al. AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Xiang Gao,et al. Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[7] Zheng Yang,et al. ToAuth: Towards Automatic Near Field Authentication for Smartphones , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[9] Di Ma,et al. Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data , 2012, ESORICS.
[10] Feng Hao,et al. Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors , 2014 .
[11] Di Ma,et al. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing , 2013, IEEE Trans. Dependable Secur. Comput..
[12] Martin Hasler,et al. New synthesis cycle for LC impedances , 1977 .
[13] Jiming Chen,et al. Dynamic Authentication with Sensory Information for the Access Control Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[14] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[15] N. Asokan,et al. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.
[16] Ahmad-Reza Sadeghi,et al. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.
[17] Eamonn J. Keogh,et al. Derivative Dynamic Time Warping , 2001, SDM.