Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to be fulfilled. For example, mobile payment applications would benefit from the ability to pair devices securely without resorting to conventional mechanisms such as shared secrets, a Public Key Infrastructure (PKI), or trusted third parties. A number of methods have been proposed for doing this based on the use of a secondary out-of-band (OOB) channel that either authenticates information passed over the normal communication channel or otherwise establishes an authenticated shared secret which can be used for subsequent secure communication. A key element of the succ...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communicatio...
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to ...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to ...
Recent years have seen a proliferation of secure device pair-ing methods that try to improve both th...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
When users wish to establish wireless radio communication between/among their devices, the channel h...
Bluetooth-like applications face the pairing problem: two devices want to establish a relationship b...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Recently several researchers and practitioners have begun to address the problem of secure device pa...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communicatio...
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to ...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to ...
Recent years have seen a proliferation of secure device pair-ing methods that try to improve both th...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
When users wish to establish wireless radio communication between/among their devices, the channel h...
Bluetooth-like applications face the pairing problem: two devices want to establish a relationship b...
In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compro...
Recently several researchers and practitioners have begun to address the problem of secure device pa...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...