LightTouch: Securely connecting wearables to ambient displays with user intent
暂无分享,去创建一个
David Kotz | Xiaohui Liang | Ronald A. Peterson | Ronald Peterson | Tianlong Yun | D. Kotz | Xiao-Hui Liang | Tianlong Yun
[1] Guoliang Xing,et al. nShield: a noninvasive NFC security system for mobiledevices , 2014, MobiSys.
[2] A. W. Roscoe,et al. Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.
[3] René Mayrhofer,et al. Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.
[4] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Prasant Mohapatra,et al. Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.
[6] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[7] Cong Wang,et al. SBVLC: Secure barcode-based visible light communication for smartphones , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[8] Claudio Soriente,et al. HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.
[9] The International Symposium on Pervasive Displays, PerDis 2012, Porto, Portugal, June 4-5, 2012 , 2012, PerDis.
[10] Guoliang Xing,et al. COBRA: color barcode streaming for smartphone systems , 2012, MobiSys '12.
[11] Zhen Wang,et al. uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications , 2009, PerCom.
[12] Hans-Werner Gellersen,et al. GesturePIN: using discrete gestures for associating mobile devices , 2010, Mobile HCI.
[13] Tadayoshi Kohno,et al. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.
[14] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[15] David Kotz,et al. ZEBRA: Zero-Effort Bilateral Recurring Authentication , 2014, IEEE Symposium on Security and Privacy.
[16] Stephan Sigg,et al. Secure Communication Based on Ambient Audio , 2013, IEEE Transactions on Mobile Computing.
[17] Kentaro Go,et al. A Study for Personal Use of the Interactive Large Public Display , 2013, HCI.
[18] Stefan Schmid,et al. LED-to-LED visible light communication networks , 2013, MobiHoc '13.
[19] Andreas Butz,et al. Is Anyone Looking? Mitigating Shoulder Surfing on Public Displays through Awareness and Protection , 2014, PerDis.
[20] Pierre Gançarski,et al. Summarizing a set of time series by averaging: From Steiner sequence to compact multiple alignment , 2012, Theor. Comput. Sci..
[21] Gregory D. Abowd,et al. A gesture-based authentication scheme for untrusted public terminals , 2004, UIST '04.
[22] Steffen Beich,et al. Digital Video And Hdtv Algorithms And Interfaces , 2016 .