Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. It is particularly challenging to make this process of associating devices easy-to-use, secure and inexpensive at the same time. A cornerstone of this process is key establishment. In this paper, we first present a taxonomy of protocols for key establishment in personal networks as well as describe and analyse specific protocols. We then use this taxonomy in surveying and comparing association models proposed in several emerging standards from security, usability and implementability perspectives
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
The paper describes the process of building a universal network security model. Various kinds of net...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The purpose of this paper is to survey the key management protocols for wired and wireless networks ...
In this paper we provide an analytical survey on security issues that are relevant for group key ex...
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
The paper describes the process of building a universal network security model. Various kinds of net...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
Introducing a new device to a network or to another device is one of the most security critical phas...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well ...
Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of fol...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The purpose of this paper is to survey the key management protocols for wired and wireless networks ...
In this paper we provide an analytical survey on security issues that are relevant for group key ex...
Personal computing devices are becoming more and more popular. These devices are able to collaborate...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the v...
The paper describes the process of building a universal network security model. Various kinds of net...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...