Sciweavers

2 search results - page 1 / 1
» A Human-Verifiable Authentication Protocol Using Visible Las...
Sort
View
TMC
2012
13 years 15 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...