Talking to strangers: Authentication in ad-hoc wireless networks, NDSS, 2002. ,
Key Agreement in Peer-to-Peer Wireless Networks, Proceedings of the IEEE Special Issue on Security and Cryptography, 2006. ,
DOI : 10.1109/JPROC.2005.862475
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.5850
New directions in cryptography, IEEE Transactions on Information Theory, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720
Manual authentication for wireless devices, RSA Cryptobytes, vol.7, issue.1, pp.29-37, 2004. ,
Using audio in secure device pairing, International Journal of Security and Networks, vol.4, issue.1/2, pp.57-68, 2009. ,
DOI : 10.1504/IJSN.2009.023426
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.9384
Validating and Securing Spontaneous Associations between Wireless Devices, Information Security, pp.44-53 ,
DOI : 10.1007/10958513_4
Efficient Mutual Data Authentication Using Manually Authenticated Strings, Cryptology and Network Security, pp.90-107 ,
DOI : 10.1007/11935070_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.2280
Shake Well Before Use: Authentication Based on Accelerometer Data, Pervasive, pp.144-161, 2007. ,
DOI : 10.1007/978-3-540-72037-9_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9793
Seeing-is-believing: Using camera phones for human-verifiable authentication. Security and Privacy, IEEE Symposium on, vol.0, pp.110-124, 2005. ,
Hash visualization: a new technique to improve realworld security, International Workshop on Cryptographic Techniques and E-Commerce, pp.131-138, 1999. ,
Efficient Device Pairing Using ???Human-Comparable??? Synchronized Audiovisual Patterns, Applied Cryptography and Network Security, pp.328-345 ,
DOI : 10.1007/978-3-540-68914-0_20
URL : http://cis.poly.edu/~nsaxena/docs/sr08.pdf
Secure device pairing based on a visual channel, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.306-313, 2006. ,
DOI : 10.1109/SP.2006.35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.4242
Location verification using secure distance bounding protocols, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., 2005. ,
DOI : 10.1109/MAHSS.2005.1542879
URL : https://www.cosic.esat.kuleuven.be/publications/article-760.pdf
HAPADEP: Human-Assisted Pure Audio Device Pairing, Lecture Notes in Computer Science, vol.5222, pp.385-400 ,
DOI : 10.1007/978-3-540-85886-7_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.6927
Beda: Button-enabled device pairing, Cryptology ePrint Archive Report, vol.246, 2007. ,
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Protocols, 7th International Workshop Proceedings, pp.172-194, 1999. ,
DOI : 10.1007/10720107_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.1450
Secure Communications over Insecure Channels Based on Short Authenticated Strings, Advances in Cryptology CRYPTO 2005, pp.309-326 ,
DOI : 10.1007/11535218_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.5120