Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2
search results - page 1 / 1
»
A Human-Verifiable Authentication Protocol Using Visible Las...
Sort
relevance
views
votes
recent
update
View
thumb
title
86
click to vote
IEEEARES
2007
IEEE
91
views
Security Privacy
»
more
IEEEARES 2007
»
A Human-Verifiable Authentication Protocol Using Visible Laser Light
15 years 9 months ago
Download
www.mayrhofer.eu.org
Rene Mayrhofer, Martyn Welch
claim paper
Read More »
159
click to vote
TMC
2012
241
views
Logical Reasoning
»
more
TMC 2012
»
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
13 years 5 months ago
Download
www.cis.uab.edu
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
claim paper
Read More »
« Prev
« First
page 1 / 1
Last »
Next »