Evidently secure device associations
暂无分享,去创建一个
[1] Tim Kindberg,et al. Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[2] Tim Kindberg,et al. Secure Spontaneous Device Association , 2003, UbiComp.
[3] Yasuyoshi Inagaki,et al. Touch-and-connect: a connection request framework for ad-hoc networks and the pervasive computing environment , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[4] Gaetano Borriello,et al. Facile: a framework for attention-correlated local communication , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[5] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[6] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[7] Bengt Ahlgren,et al. Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[10] Tim Kindberg,et al. Validating and Securing Spontaneous Associations between Wireless Devices , 2003, ISC.
[11] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[12] Adi Shamir,et al. How to expose an eavesdropper , 1984, CACM.