KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks
暂无分享,去创建一个
[1] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[2] F. Golatowski,et al. Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.
[3] Bo Sheng,et al. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes , 2007 .
[4] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.
[5] Maximilian Ott,et al. Source-location privacy for networks of energy-constrained sensors , 2004, Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings..
[6] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] René Mayrhofer,et al. On the Security of Ultrasound as Out-of-band Channel , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[8] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[9] Mani B. Srivastava,et al. Context-aware access to public shared devices , 2007, HealthNet '07.
[10] D Purves,et al. Temporal events in cyclopean vision. , 1996, Proceedings of the National Academy of Sciences of the United States of America.
[11] Claudio Soriente,et al. BEDA: Button-Enabled Device Pairing , 2007, IACR Cryptol. ePrint Arch..
[12] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.