Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
A Calculus for Secure Channel Establishment in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Proceedings of the 13th international conference on Security protocols
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Ad hoc security associations for groups
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
New directions in cryptography
IEEE Transactions on Information Theory
On the security of public key protocols
IEEE Transactions on Information Theory
On a Construction of Short Digests for Authenticating Ad Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Combining social authentication and untrusted clouds for private location sharing
Proceedings of the 18th ACM symposium on Access control models and technologies
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
Many security protocols were designed to run over inherently insecure channels such as ad hoc radio or the packet-switched Internet. However, they can be strengthened with additional transmissions over other lower-capacity channels, commonly found in ubicomp environments, that offer a different mix of security properties. A single protocol might exploit different channels for different messages in its trace. The authors demonstrate this point by presenting and discussing several security protocols for ubicomp pairing and group key agreement. This article is part of a special issue on security and privacy.