Closing the blinds: Four strategies for protecting smart home privacy from network observers, 2017. ,
A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic, 2017. ,
Instant personalization and temporary ownership of handheld devices, Mobile Computing Systems and Applications, 2004. WMCSA 2004. Sixth IEEE Workshop on, pp.134-143, 2004. ,
Performance comparison of AES-CCM and AES-GCM authenticated encryption modes, Proceedings of the International Conference on Security and Management (SAM), p.331, 2016. ,
Practical NFC peer-to-peer relay attack using mobile phones, International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp.35-49, 2010. ,
, Keylength -NIST report on cryptographic key length and cryptoperiod, 2016.
A dynamic, context-aware security infrastructure for distributed healthcare applications, Proceedings of the first workshop on pervasive privacy security, privacy, and trust, pp.1-8, 2004. ,
Context-aware access control in pervasive healthcare, Computer Science and Information Engineering, 2005. ,
A dynamic context-aware access control architecture for e-services, computers & security, vol.25, issue.7, pp.507-521, 2006. ,
Enhancing privacy in IoT devices through automated handling of ownership change, 2017. ,
Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures, International Journal of Computer Science and Management Studies, vol.11, issue.03, 2011. ,
Selecting cryptographic key sizes, Journal of cryptology, vol.14, issue.4, pp.255-293, 2001. ,
AES-CCM cipher suites for Transport Layer Security (TLS), 2012. ,
Contextbased zero-interaction pairing and key evolution for advanced personal devices, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.880-891, 2014. ,
ConXsense: automated context classification for context-aware access control, Proceedings of the 9th ACM symposium on information, computer and communications security, pp.293-304, 2014. ,
, IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT, 2016.
Ownership authentication transfer protocol for ubiquitous computing devices, 2012. ,
Easyguard: enhanced context-aware adaptive access control system for android platform: poster, Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, pp.458-459, 2016. ,
RFC 2631 -Diffie-Hellman key agreement method, 1999. ,
, Contextual proximity detection in the face of context-manipulating adversaries, 2015.
Protocol for ownership of physical objects in ubiquitous computing environments, IADIS international conference E-Society, pp.614-621, 2004. ,
Automatic ownership change detection for IoT devices ,
Counter with cbc-mac (ccm), 2003. ,
Towards context-aware security: An authorization architecture for intranet environments, Proceedings of the Second IEEE Annual Conference on, pp.132-137, 2004. ,
Context-aware dynamic access control for pervasive applications, Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, pp.21-30, 2004. ,
Am i really at risk? determinants of online users' intentions to use strong passwords, Journal of Internet Commerce, vol.8, issue.3-4, pp.180-197, 2009. ,