Secure Context-based Pairing for Unprecedented Devices
暂无分享,去创建一个
[1] Antonio Garzon,et al. MASK: Robust Local Features for Audio Fingerprinting , 2012, 2012 IEEE International Conference on Multimedia and Expo.
[2] Mario Huemer,et al. Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.
[3] Stephan Sigg,et al. BANDANA — Body area network device-to-device authentication using natural gAit , 2016, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[4] Ahmad-Reza Sadeghi,et al. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.
[5] Kai Oliver Arras,et al. Audio-based human activity recognition using Non-Markovian Ensemble Voting , 2012, 2012 IEEE RO-MAN: The 21st IEEE International Symposium on Robot and Human Interactive Communication.
[6] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[7] René Mayrhofer,et al. A Survey of User Interaction for Spontaneous Device Association , 2014, CSUR.
[8] Yusheng Ji,et al. PINtext: A Framework for Secure Communication Based on Context , 2011, MobiQuitous.
[9] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[10] Petteri Nurmi,et al. Using contextual co-presence to strengthen Zero-Interaction Authentication:Design, integration and usability , 2015 .
[11] Avery Wang,et al. An Industrial Strength Audio Search Algorithm , 2003, ISMIR.
[12] Mario Di Francesco,et al. MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[13] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[14] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.
[15] Thomas Kunz,et al. Wireless Fingerprints Inside a Wireless Sensor Network , 2015, ACM Trans. Sens. Networks.
[16] Tuomas Aura,et al. Commitment-based device pairing with synchronized drawing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[17] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[18] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[19] Tuomas Aura,et al. Commitment-based device-pairing protocol with synchronized drawings and comparison metrics , 2015 .
[20] Gerhard Widmer,et al. Quad-Based Audio Fingerprinting Robust to Time and Frequency Scaling , 2014, DAFx.
[21] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[22] René Mayrhofer,et al. The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams , 2007, ESAS.
[23] Rong Jin,et al. MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers , 2016, IEEE Transactions on Information Forensics and Security.
[24] Yusheng Ji,et al. AdhocPairing : Spontaneous audio based secure device pairing for Android mobile devices , 2012 .
[25] Ashok Jhunjhunwala,et al. Scalable and robust audio fingerprinting method tolerable to time-stretching , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).
[26] Stephan Sigg,et al. Secure Communication Based on Ambient Audio , 2013, IEEE Transactions on Mobile Computing.