AbstractIn recent years, there has been growing interest in secure pairing, which refers to the establishment of a secure connection between two mobile devices. Many published studies have described the various types of out-of-band (OOB) channels through which authentication data can be transferred with user control and involvement. However, there has been little discussion of setting up secure connections between groups of mobile devices. Some security protocols have been proposed, but they have tended to focus on a scenario whereby all devices must be located in one place to perform the association.In this paper, we describe a new group association method, called MobileCA. Our method is designed for a broader range of scenarios and does n...
The rapid progress and the wide-spread use of the Internet and wireless communications in our profes...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
AbstractIn recent years, there has been growing interest in secure pairing, which refers to the esta...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge tha...
Solutions for an easy and secure setup of a wireless connection between two devices are urgently n...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks (MANets) are be...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are b...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
[[abstract]]A group key agreement protocol enables a group of communicating parties over an untruste...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
The rapid progress and the wide-spread use of the Internet and wireless communications in our profes...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
AbstractIn recent years, there has been growing interest in secure pairing, which refers to the esta...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge tha...
Solutions for an easy and secure setup of a wireless connection between two devices are urgently n...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
Ad hoc networks of mobile devices have posed challenges never seen before in conven-tional wired net...
Due to the rapid growth of small and smart hand-held devices, mobile ad hoc networks (MANets) are be...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are b...
[[abstract]]With rapid growth of mobile wireless networks, many mobile applications have received si...
[[abstract]]A group key agreement protocol enables a group of communicating parties over an untruste...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
The rapid progress and the wide-spread use of the Internet and wireless communications in our profes...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...