IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Authenticating ad hoc networks by comparison of short digests
Information and Computation
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
Proceedings of the 6th ACM conference on Embedded network sensor systems
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
A case for P2P infrastructure for social networks - opportunities & challenges
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
What is Twitter, a social network or a news media?
Proceedings of the 19th international conference on World wide web
Social Cloud: Cloud Computing in Social Networks
CLOUD '10 Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing
SPATE: Small-Group PKI-Less Authenticated Trust Establishment
IEEE Transactions on Mobile Computing
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
WhozThat? evolving an ecosystem for context-aware mobile social networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Online social networks are rapidly changing our lives. Their growing pervasiveness and the trust that we develop in online identities provide us with a new platform for security applications. Additionally, the integration of various sensors and mobile devices on social networks has shortened the separation between one's physical and virtual (i.e. web) presences. We envisage that social networks will serve as the portal between the physical world and the digital world. However, challenges arise when using social networks in security applications; for example, how can one prove to a friend (or Friend) that your Facebook page belongs to you and not a man in the middle? Once you have proved this, how can you use it to create a secure channel between any device belonging to you and one belonging to your friend? We show how human interactive security protocols (HISPs) can greatly assist in both these areas and in general create a decentralised and user-oriented model of security. And we demonstrate that by using this security model we can quickly and efficiently bootstrap security for sharing information within a large group.