PINtext: A Framework for Secure Communication Based on Context
暂无分享,去创建一个
[1] Heinrich Hußmann,et al. TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones , 2010, Pervasive.
[2] Boris Skoric. Security with Noisy Data - (Extended Abstract of Invited Talk) , 2010, Information Hiding.
[3] Josef Langer,et al. NFC Devices: Security and Privacy , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[4] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[5] John Paul Dunning,et al. Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.
[6] Christos N. Pitelis,et al. Clusters and Globalisation:The Development of Urban and Regional Economies , 2006 .
[7] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[8] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[9] Gregory D. Abowd,et al. Ubicomp 2007: Ubiquitous Computing , 2008 .
[10] Stuart E. Schechter,et al. Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.
[11] Claude Castelluccia,et al. An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[12] Mario Huemer,et al. Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.
[13] Andreas Krause,et al. SenSay: a context-aware mobile phone , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] N. Kuiper. Tests concerning random points on a circle , 1960 .
[16] Karen A. Scarfone,et al. Guidelines on Cell Phone and PDA Security , 2008 .
[17] Gregory D. Abowd,et al. Ubicomp 2001: Ubiquitous Computing , 2001, Lecture Notes in Computer Science.
[18] Stephan Sigg,et al. Context-based security: state of the art, open research topics and a case study , 2011, CASEMANS '11.
[19] Albrecht Schmidt,et al. Physical Prototyping with Smart-its Embedded Ubiquitous Computing Systems , 2022 .
[20] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[21] Rene Mayrhofer,et al. Shake well before use: two implementations for implicit context authentication , 2007 .
[22] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[23] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[24] G.S. Smith,et al. A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.
[25] André Torre,et al. Local clusters, trust, confidence and proximity , 2006 .
[26] René Mayrhofer,et al. Spontaneous mobile device authentication based on sensor data , 2008, Inf. Secur. Tech. Rep..
[27] Yusheng Ji,et al. Entropy of Audio Fingerprints for Unobtrusive Device Authentication , 2011, CONTEXT.
[28] Patrick Brézillon,et al. Modeling and Using Context , 1999, Lecture Notes in Computer Science.
[29] Paul Lukowicz,et al. Symbolic Object Localization Through Active Sampling of Acceleration and Sound Signatures , 2007, UbiComp.
[30] Gene Tsudik,et al. Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers , 2005, ESAS.
[31] René Mayrhofer,et al. The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams , 2007, ESAS.
[32] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[33] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System With an Efficient Search Strategy , 2003 .
[34] Lin Cai,et al. Secret Key Generation and Agreement in UWB Communication Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[35] Mario Huemer,et al. Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[36] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[37] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.