Bluetooth-like applications face the pairing problem: two devices want to establish a relationship between them without any prior private information. Hoepman studied the ephemeral pairing problem by regarding the human operator of the devices as a messenger in an authenticated and/or private low-bandwidth channel between the nodes. Here we study the pairing problem with user interaction in which the operator can participate by doing extra (simple) computations
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
The number and diversity of electronic gadgets has been steadily increasing and they are becoming in...
Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure as...
Abstract. Bluetooth is a popular standard for short-range wireless communications. Bluetooth device ...
This paper analyzes the security of Bluetooth v4.0’s Secure Simple Pairing (SSP) protocol, for both ...
The Bluetooth wireless technology realizes a low-cost short-range wireless voice- and data-connectio...
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, ...
Today, pairing of Bluetooth Low Energy (BLE) capable devices with user devices is neither secure nor...
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge tha...
As the use of the Bluetooth technology in wireless technologies such as computers, cell phones, pers...
This publication describes methods of generating bonding information for connecting with a Bluetooth...
Abstract. The ephemeral pairing problem requires two or more specific physical nodes in a wireless b...
In wireless personal area networks, establishing trust and authentication with previously unknown pa...
The out-of-band pairing of Bluetooth devices utilizing a quick response code provides a novel method...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
The number and diversity of electronic gadgets has been steadily increasing and they are becoming in...
Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure as...
Abstract. Bluetooth is a popular standard for short-range wireless communications. Bluetooth device ...
This paper analyzes the security of Bluetooth v4.0’s Secure Simple Pairing (SSP) protocol, for both ...
The Bluetooth wireless technology realizes a low-cost short-range wireless voice- and data-connectio...
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, ...
Today, pairing of Bluetooth Low Energy (BLE) capable devices with user devices is neither secure nor...
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge tha...
As the use of the Bluetooth technology in wireless technologies such as computers, cell phones, pers...
This publication describes methods of generating bonding information for connecting with a Bluetooth...
Abstract. The ephemeral pairing problem requires two or more specific physical nodes in a wireless b...
In wireless personal area networks, establishing trust and authentication with previously unknown pa...
The out-of-band pairing of Bluetooth devices utilizing a quick response code provides a novel method...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
The number and diversity of electronic gadgets has been steadily increasing and they are becoming in...