On pairing constrained wireless devices based on secrecy of auxiliary channels
- 4 October 2010
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Treat 'em like other devicesPublished by Association for Computing Machinery (ACM) ,2009
- Caveat eptor: A comparative study of secure device pairing methodsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User BehaviorLecture Notes in Computer Science, 2009
- Secure pairing of interface constrained devicesInternational Journal of Security and Networks, 2009
- Simple and effective defense against evil twin access pointsPublished by Association for Computing Machinery (ACM) ,2008
- Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Keyboard acoustic emanations revisitedPublished by Association for Computing Machinery (ACM) ,2005
- Seeing-Is-Believing: Using Camera Phones for Human-Verifiable AuthenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Keyboard acoustic emanationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Acoustic modems for ubiquitous computingIEEE Pervasive Computing, 2003