Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Physical Prototyping with Smart-Its
IEEE Pervasive Computing
The Shazam music recognition service
Communications of the ACM - Music information retrieval
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Symbolic object localization through active sampling of acceleration and sound signatures
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
An adaptive quantization algorithm for secret key generation using radio channel measurements
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
SpeakerSense: energy efficient unobtrusive speaker identification on mobile phones
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Robust fuzzy extractors and authenticated key agreement from close secrets
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
TreasurePhone: context-sensitive user data protection on mobile phones
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Hi-index | 0.00 |
We discuss the use of context for cryptographic applications and present a case study in which we exemplary utilise ambient audio to establish a common cryptographic key among devices in proximity. We show that we can tweak the security level of the application by adapting the parameters of the Reed-Solomon error correcting code utilised.