The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Bootstrapping multi-party ad-hoc security
Proceedings of the 2006 ACM symposium on Applied computing
Proceedings of the 13th international conference on Security protocols
Secure sessions from weak secrets
Proceedings of the 11th international conference on Security Protocols
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Spontaneous networking: an application oriented approach to ad hoc networking
IEEE Communications Magazine
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
We present a new protocol for cryptographic key agreement between devices which have had no previous association, and which does not rely upon mutual access to a pre-existing key infrastructure. This protocol is suitable for use in mobile ad-hoc computing environments, where the only channels with high data origin authenticity have severely limited bandwidth. The protocol illustrates one use of an heretical design principle: allowing the "same" protocol to provide different security services in different contexts.