Two decades ago, two influential papers on key agreement in ad hoc settings set off a torrent of follow-up research. A decade ago, several players in the consumer-facing ICT industry realized that this research could address a burning problem they faced, also known as the device association problem (sometimes also referred to as the device pairing problem): how to allow ordinary people to securely, yet easily and without additional cost, set up secure communication between their new personal devices. A concerted effort by researchers, practitioners and standards development organizations resulted in device association solutions being widely deployed. In this article, we briefly survey this journey and reflect on the current open problems in...
Introducing a new device to a network or to another device is one of the most security critical phas...
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issu...
This paper describes work in progress to investigate security models and mechanisms to support group...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Introducing a new device to a network or to another device is one of the most security critical phas...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
As wireless devices increasingly becoming ubiquitous, spontaneous interaction opportunities are acco...
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks (MANets) are be...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Abstract There are various network-enabled and embedded computers deployed around us. Although we ca...
Recent years have seen a proliferation of secure device pair-ing methods that try to improve both th...
In the near future, many personal electronic devices will be able to communicate with each other ove...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
Introducing a new device to a network or to another device is one of the most security critical phas...
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issu...
This paper describes work in progress to investigate security models and mechanisms to support group...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Introducing a new device to a network or to another device is one of the most security critical phas...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
As computing devices become ubiquitous, devices are expected to encounter and associate with one ano...
As wireless devices increasingly becoming ubiquitous, spontaneous interaction opportunities are acco...
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks (MANets) are be...
Abstract. Existing standards (ZigBee and Bluetooth Low Energy) for networked low-power wireless devi...
Abstract There are various network-enabled and embedded computers deployed around us. Although we ca...
Recent years have seen a proliferation of secure device pair-ing methods that try to improve both th...
In the near future, many personal electronic devices will be able to communicate with each other ove...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
Introducing a new device to a network or to another device is one of the most security critical phas...
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issu...
This paper describes work in progress to investigate security models and mechanisms to support group...