This report presents a method for establishing and securing spontaneous interactions on the basis of spatial references which are obtained by accurate sensing of relative device positions. Utilising the Relate ultrasonic sensing system, we construct an interlocked protocol using radio frequency messages and ultrasonic pulses for verifying that two devices share a secret. This verification is necessary to prevent manin -the-middle attacks on standard Di#e-Hellman key agreement
Abstract. Secure communication over wireless channels necessitates authentication of communication p...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
A Security Manager Device 16 employs a transmitter (22, fig. 2) requiring close proximity to a clien...
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computin...
This disclosure addresses the problem of ranging or imaging a remote environment, e.g., a remote con...
The cheap versatility of modern embedded systems is being harnessed to attack sprawling tasks with t...
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless a...
We propose and demonstrate a method to establish a secure communication session between two devices ...
Automatic identification systems represent a wide classification of devices used primarily in commer...
It is crucial for public users and service providers to stay abreast of the progress and trends on d...
Recently, researchers have proposed a number of ranging and positioning techniques for wireless netw...
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
Abstract. Secure communication over wireless channels necessitates authentication of communication p...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
A Security Manager Device 16 employs a transmitter (22, fig. 2) requiring close proximity to a clien...
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computin...
This disclosure addresses the problem of ranging or imaging a remote environment, e.g., a remote con...
The cheap versatility of modern embedded systems is being harnessed to attack sprawling tasks with t...
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless a...
We propose and demonstrate a method to establish a secure communication session between two devices ...
Automatic identification systems represent a wide classification of devices used primarily in commer...
It is crucial for public users and service providers to stay abreast of the progress and trends on d...
Recently, researchers have proposed a number of ranging and positioning techniques for wireless netw...
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
With the growing prevalence of sensor and wireless networks comes a new demand for location-based ac...
Abstract. Secure communication over wireless channels necessitates authentication of communication p...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
A Security Manager Device 16 employs a transmitter (22, fig. 2) requiring close proximity to a clien...