mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computing is that of setting up an association between a pair of devices so that they may communicate securely over a wireless network. It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on pre-existing security values such as certificates, and when the only means of identifying the target device is physical. This paper contributes protocols for validating secure spontaneous associations. The protocols complement existing unauthenticated key-exchange protocols and work over widely used wireless technologies. They improve on previous work by eliminating specialised hardware. We present the...
As wireless devices increasingly becoming ubiquitous, spontaneous interaction opportunities are acco...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
AbstractIn recent years, there has been growing interest in secure pairing, which refers to the esta...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
Some of the most significant security issues arising in the context of ubiquitous mobile computing a...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
Introducing a new device to a network or to another device is one of the most security critical phas...
In this paper we propose a protocol that allows users operating mobile wireless personal devices to ...
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issu...
As wireless devices increasingly becoming ubiquitous, spontaneous interaction opportunities are acco...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
AbstractIn recent years, there has been growing interest in secure pairing, which refers to the esta...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
Some of the most significant security issues arising in the context of ubiquitous mobile computing a...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
Introducing a new device to a network or to another device is one of the most security critical phas...
In this paper we propose a protocol that allows users operating mobile wireless personal devices to ...
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issu...
As wireless devices increasingly becoming ubiquitous, spontaneous interaction opportunities are acco...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...