Survey and Systematization of Secure Device Pairing
暂无分享,去创建一个
Paul Gardner-Stephen | Matthias Hollick | Daniel Steinmetzer | Mikhail Fomichev | Flor Álvarez | M. Hollick | Daniel Steinmetzer | P. Gardner-Stephen | Mikhail Fomichev | Flor Álvarez | Paul Gardner-Stephen
[1] Jean Leneutre,et al. Formal Analysis of Secure Device Pairing Protocols , 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications.
[2] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[3] Sean White,et al. RhythmLink: securely pairing I/O-constrained devices by tapping , 2011, UIST.
[4] Romit Roy Choudhury,et al. Listening through a Vibration Motor , 2016, MobiSys.
[5] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[6] Jason I. Hong,et al. Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.
[7] Adi Shamir,et al. How to expose an eavesdropper , 1984, CACM.
[8] René Mayrhofer,et al. On the Security of Ultrasound as Out-of-band Channel , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[9] Xiaohui Liang,et al. Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[10] N. Asokan,et al. Contextual Proximity Detection in the Face of Context-Manipulating Adversaries , 2015, ArXiv.
[11] TsudikGene,et al. A comparative study of secure device pairing methods , 2009 .
[12] Claudio Soriente,et al. BEDA: Button-Enabled Device Pairing , 2007, IACR Cryptol. ePrint Arch..
[13] Rong Jin,et al. MagPairing: Exploiting magnetometers for pairing smartphones in close proximity , 2014, 2014 IEEE Conference on Communications and Network Security.
[14] Yu Cheng,et al. Secure device-to-device communications over WiFi direct , 2016, IEEE Network.
[15] Sourangsu Banerji,et al. On IEEE 802.11: Wireless LAN Technology , 2013, ArXiv.
[16] Kui Ren,et al. Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[17] Dina Katabi,et al. Secure In-Band Wireless Pairing , 2011, USENIX Security Symposium.
[18] Tadayoshi Kohno,et al. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.
[19] Salil S. Kanhere,et al. A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..
[20] Kim-Kwang Raymond Choo,et al. Bridging the Air Gap: Inaudible Data Exfiltration by Insiders , 2014, AMCIS.
[21] Rodrigo Roman,et al. KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[22] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[23] Romesh Nagarajah,et al. Ultrasonic Fluid Quantity Measurement in Dynamic Vehicular Applications: A Support Vector Machine Approach , 2013 .
[24] Yan Zhang,et al. Security in RFID and Sensor Networks , 2009 .
[25] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[26] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[27] Qian Zhang,et al. Touch-and-guard: secure pairing through hand resonance , 2016, UbiComp.
[28] Srdjan Capkun,et al. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels , 2006, IEEE Transactions on Dependable and Secure Computing.
[29] Srdjan Capkun,et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.
[30] Guoliang Xue,et al. A Proximity Authentication System for Smartphones , 2016, IEEE Transactions on Dependable and Secure Computing.
[31] David Kotz,et al. LightTouch: Securely connecting wearables to ambient displays with user intent , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[32] Jaime Lloret,et al. IPTV performance in IEEE 802.11n WLANs , 2010, 2010 IEEE Globecom Workshops.
[33] Dawn Song,et al. Hash Visualization: a New Technique to improve Real-World Security , 1999 .
[34] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[35] Gierad Laput,et al. Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks , 2017, CHI.
[36] Di Ma,et al. Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing , 2012, IEEE Transactions on Dependable and Secure Computing.
[37] Christof Paar,et al. Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.
[38] Jani Suomalainen. Smartphone assisted security pairings for the Internet of Things , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).
[39] Jens Grubert,et al. Challenges in mobile multi-device ecosystems , 2016, mUX: The Journal of Mobile User Experience.
[40] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[41] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[42] Volker Roth,et al. Simple and effective defense against evil twin access points , 2008, WiSec '08.
[43] Xiang Gao,et al. Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[44] Matthias Hollick,et al. DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices , 2016, WISEC.
[45] Hung-Min Sun,et al. A Study of User-Friendly Hash Comparison Schemes , 2009, 2009 Annual Computer Security Applications Conference.
[46] Tuomas Aura,et al. Commitment-based device pairing with synchronized drawing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[47] Edward W. Knightly,et al. The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications , 2015, VLCS@MobiCom.
[48] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[49] Cong Wang,et al. SBVLC: Secure barcode-based visible light communication for smartphones , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[50] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[51] Nitesh Saxena,et al. Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior , 2009, ACNS.
[52] Wenye Wang,et al. Review and evaluation of security threats on the communication networks in the smart grid , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[53] Claude Castelluccia,et al. Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.
[54] A. B. M. Musa,et al. Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.
[55] Nitesh Saxena,et al. Playful security: A computer game for secure wireless device pairing , 2011, 2011 16th International Conference on Computer Games (CGAMES).
[56] Ashwin Ashok,et al. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[57] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[58] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[59] Chunming Hu,et al. Enhancing reliability to boost the throughput over screen-camera links , 2014, MobiCom.
[60] Joe F. Chicharo,et al. Unfairness and capture behaviour in 802.11 adhoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.
[61] John Paul Dunning,et al. Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.
[62] Sai Shankar Nandagopalan,et al. WiGig and IEEE 802.11ad - For multi-gigabyte-per-second WPAN and WLAN , 2012, ArXiv.
[63] Nitesh Saxena,et al. Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns , 2008, ACNS.
[64] Jaafar M. H. Elmirghani,et al. 20 Gb/s Mobile Indoor Visible Light Communication System Employing Beam Steering and Computer Generated Holograms , 2015, Journal of Lightwave Technology.
[65] Frédo Durand,et al. The visual microphone , 2014, ACM Trans. Graph..
[66] Andrzej Glowacz,et al. Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects , 2013, 2013 International Conference on Availability, Reliability and Security.
[67] Di Ma,et al. Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data , 2012, ESORICS.
[68] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[69] Dina Katabi,et al. PixNet: interference-free wireless links using LCD-camera pairs , 2010, MobiCom.
[70] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[71] Nitesh Saxena,et al. Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise , 2016, WISEC.
[72] Punith P. Salian,et al. Visible Light Communication , 2013, 2013 Texas Instruments India Educators' Conference.
[73] Soonuk Seol,et al. Smart phone assisted personal IoT service , 2015 .
[74] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[75] Xiang-Yang Li,et al. Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.
[76] Mahmudur Rahman,et al. Seeing is not believing: visual verifications through liveness analysis using mobile devices , 2013, ACSAC.
[77] Cecilia Mascolo,et al. Beyond location check-ins: Exploring physical and soft sensing to augment social check-in apps , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[78] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[79] Dean Anthony Gratton. The Handbook of Personal Area Networking Technologies and Protocols: Bluetooth low energy , 2013 .
[80] Nitesh Saxena,et al. Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing , 2013, IEEE Transactions on Information Forensics and Security.
[81] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[82] Parth H. Pathak,et al. Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges , 2015, IEEE Communications Surveys & Tutorials.
[83] Rene Mayrhofer,et al. An Authentication Protocol using Ultrasonic Ranging , 2006 .
[84] René Mayrhofer,et al. SAPHE: simple accelerometer based wireless pairing with heuristic trees , 2012, MoMM '12.
[85] Ji Won Yoon,et al. Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack , 2015, WISA.
[86] Guoliang Xing,et al. VINCE: Exploiting visible light sensing for smartphone-based NFC systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[87] Romit Roy Choudhury,et al. Ripple: Communicating through Physical Vibration , 2015, NSDI.
[88] Nitesh Saxena,et al. Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals , 2015, CANS.
[89] Bart Preneel,et al. On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them , 2016, ACSAC.
[90] Max Maass,et al. NFCGate: an NFC relay application for Android , 2015, WISEC.
[91] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[92] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[93] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.
[94] Arun Kumar,et al. Pairing devices for social interactions: a comparative usability evaluation , 2011, CHI.
[95] Stephan Sigg,et al. Secure Communication Based on Ambient Audio , 2013, IEEE Transactions on Mobile Computing.
[96] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[97] Paul Gardner-Stephen,et al. The Village Telco project: a reliable and practical wireless mesh telephony infrastructure , 2011, EURASIP J. Wirel. Commun. Netw..
[98] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[99] Guoliang Xing,et al. nShield: a noninvasive NFC security system for mobiledevices , 2014, MobiSys.
[100] Josef Hallberg,et al. Positioning with Bluetooth, IrDA and RFID , 2002 .
[101] Nitesh Saxena,et al. All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines , 2015, ESORICS.
[102] P. Carayon,et al. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. , 2007, Applied ergonomics.
[103] Di Ma,et al. A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems , 2014, Secur. Commun. Networks.
[104] N. Asokan,et al. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks , 2015, NDSS.
[105] Kao-Cheng Huang,et al. Millimeter-Wave Communication Systems , 2011, CMOS Millimeter-Wave Integrated Circuits for Next Generation Wireless Communication Systems.
[106] Guoliang Xing,et al. COBRA: color barcode streaming for smartphone systems , 2012, MobiSys '12.
[107] Antonio Lioy,et al. Dependability in Wireless Networks: Can We Rely on WiFi? , 2007, IEEE Security & Privacy.
[108] Ivan Martinovic,et al. STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification , 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[109] N. Asokan,et al. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.
[110] Stephan Sigg,et al. BANDANA — Body area network device-to-device authentication using natural gAit , 2016, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[111] Tim Kindberg,et al. Validating and Securing Spontaneous Associations between Wireless Devices , 2003, ISC.
[112] N. Asokan,et al. Secure Device Pairing Based on a Visual Channel: Design and Usability Study , 2011, IEEE Transactions on Information Forensics and Security.
[113] Srdjan Capkun,et al. Are We Really Close? Verifying Proximity in Wireless Systems , 2017, IEEE Security & Privacy.
[114] Sridhar Rajagopal,et al. IEEE 802.15.7 visible light communication: modulation schemes and dimming support , 2012, IEEE Communications Magazine.
[115] Theodore S. Rappaport,et al. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.
[116] Dinko Begusic,et al. Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User , 2012, IEEE Transactions on Mobile Computing.
[117] Mario Cagalj,et al. Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices , 2016, Secur. Commun. Networks.
[118] Xiaomin Liu,et al. Fast Secure Computation of Set Intersection , 2010, SCN.
[119] Michael Rohs,et al. User-defined gestures for connecting mobile phones, public displays, and tabletops , 2010, Mobile HCI.
[120] Shusen Yang,et al. Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing , 2017, IEEE Transactions on Mobile Computing.
[121] Zhen Ling,et al. Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.
[122] Mudhakar Srivatsa,et al. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.
[123] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[124] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[125] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[126] W. Buxton. Human-Computer Interaction , 1988, Springer Berlin Heidelberg.
[127] Hanaan Rosenthal. The Business of Automation , 2004 .
[128] S. Bolanowski,et al. Four channels mediate the mechanical aspects of touch. , 1988, The Journal of the Acoustical Society of America.
[129] Gerhard P. Hancke,et al. Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.
[130] Richard Sharp,et al. Audio networking: the forgotten wireless technology , 2005, IEEE Pervasive Computing.
[131] René Mayrhofer,et al. UACAP: A Unified Auxiliary Channel Authentication Protocol , 2013, IEEE Transactions on Mobile Computing.
[132] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[133] Keith Mayes,et al. When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data , 2016, ArXiv.
[134] 罗国昭. Wi-Fi Direct技术发布 , 2010 .
[135] Tokumaru Michiko. Millimeter-Wave Communication Systems , 2009 .
[136] Nitesh Saxena,et al. Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics , 2016, ArXiv.
[137] Budi Arief,et al. Computer security impaired by legitimate users , 2004, Comput. Secur..
[138] George T. Amariucai,et al. An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID , 2011, RFIDSec.
[139] Shiwen Mao,et al. Advanced Wireless LAN Technologies: IEEE 802.11AC and Beyond , 2015, GETMBL.
[140] Wei Wang,et al. vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge , 2015, ESORICS.
[141] Adrian Perrig,et al. SafeSlinger: easy-to-use and secure public-key exchange , 2013, MobiCom.
[142] Prasant Mohapatra,et al. Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.
[143] Ahmad-Reza Sadeghi,et al. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.
[144] René Mayrhofer,et al. A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[145] Harald Haas. Visible light communication: Tutorial , 2015 .
[146] Srdjan Capkun,et al. Influence of user perception, security needs, and social factors on device pairing method choices , 2010, SOUPS.
[147] Lara Khansa,et al. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management , 2009, Computers & security.
[148] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[149] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[150] Yang Wang,et al. Serial hook-ups: a comparative usability study of secure device pairing methods , 2009, SOUPS.
[151] J. Langer,et al. Applying relay attacks to Google Wallet , 2013, 2013 5th International Workshop on Near Field Communication (NFC).
[152] Nicu Sebe,et al. Multimodal Human Computer Interaction: A Survey , 2005, ICCV-HCI.
[153] Haitham S. Cruickshank,et al. Secure Device Pairing: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[154] Michael J. Rycroft,et al. Understanding GPS. Principles and Applications , 1997 .
[155] Claudio Soriente,et al. HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.
[156] Yina Ye,et al. Checksum gestures: continuous gestures as an out-of-band channel for secure pairing , 2015, UbiComp.
[157] Carlisle M. Adams,et al. On Acoustic Covert Channels Between Air-Gapped Systems , 2014, FPS.
[158] N. Asokan,et al. Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[159] Paul Gardner-Stephen,et al. The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .
[160] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[161] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[162] Wei Wang,et al. WAVE: Secure Wireless Pairing Exploiting Human Body Movements , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[163] Martin Welk,et al. Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[164] Peter Howell,et al. Signals and Systems for Speech and Hearing , 1991 .
[165] S. Weis. RFID ( Radio Frequency Identification ) : Principles and Applications , 2007 .
[166] Feng Hao,et al. Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment , 2015, SSR.
[167] Pedro José Marrón,et al. Enlighten me! secure key assignment in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[168] Laura A. Dabbish,et al. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation , 2014, CCS.
[169] Gerhard P. Hancke,et al. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones , 2011, IACR Cryptol. ePrint Arch..
[170] Hans-Werner Gellersen,et al. Usability classification for spontaneous device association , 2011, Personal and Ubiquitous Computing.
[171] Nitesh Saxena,et al. Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios , 2014, International Journal of Information Security.
[172] A. W. Roscoe,et al. Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.
[173] Qian Zhang,et al. Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.
[174] Athanasios V. Vasilakos,et al. A survey of millimeter wave communications (mmWave) for 5G: opportunities and challenges , 2015, Wireless Networks.
[175] Matthias Hollick,et al. Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control , 2017, WISEC.
[176] Lujo Bauer,et al. Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement , 2011, ACSAC '11.
[177] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[178] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[179] Edward W. Knightly,et al. Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[180] Dawn Song,et al. Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.
[181] A. W. Roscoe,et al. Two heads are better than one: security and usability of device associations in group scenarios , 2010, SOUPS.
[182] René Mayrhofer,et al. A Survey of User Interaction for Spontaneous Device Association , 2014, CSUR.
[183] Keijo Haataja,et al. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.
[184] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.