Sciweavers

19 search results - page 1 / 4
» Context Authentication Using Constrained Channels
Sort
View
WMCSA
2002
IEEE
13 years 9 months ago
Context Authentication Using Constrained Channels
Tim Kindberg, Kan Zhang, Narendar Shankar
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
13 years 11 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
TMC
2012
11 years 7 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICDCSW
2008
IEEE
13 years 11 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
13 years 10 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner