Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security1 required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security but potentially reduce usability of protocols which may result in users making mistakes that compromise security. This conflict between technical security and usability requires methods for transferring fingerprints between devices that maximise both to achieve acceptable effe...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to ...
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge tha...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
In this paper, we present a critical assessment of the use of device fingerprinting for risk-based a...
Wireless network suffers from security threats which are of different nature. One of the most signif...
We propose and demonstrate a method to establish a secure communication session between two devices ...
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communicatio...
Handheld devices have become so commonplace nowadays that they are an integral part of our everyday ...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robust...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to ...
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge tha...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
In this paper, we present a critical assessment of the use of device fingerprinting for risk-based a...
Wireless network suffers from security threats which are of different nature. One of the most signif...
We propose and demonstrate a method to establish a secure communication session between two devices ...
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communicatio...
Handheld devices have become so commonplace nowadays that they are an integral part of our everyday ...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robust...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...