Designing an architecture for delivering mobile information services to the rural developing world
Proceedings of the 15th international conference on World Wide Web
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Fourth-factor authentication: somebody you know
Proceedings of the 13th ACM conference on Computer and communications security
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Rendezvous-based access control for medical records in the pre-hospital environment
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Simple and effective defense against evil twin access points
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Trustworthy and personalized computing on public kiosks
Proceedings of the 6th international conference on Mobile systems, applications, and services
Universal device pairing using an auxiliary device
Proceedings of the 4th symposium on Usable privacy and security
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
A Demonstrative Ad Hoc Attestation System
ISC '08 Proceedings of the 11th international conference on Information Security
HAPADEP: Human-Assisted Pure Audio Device Pairing
ISC '08 Proceedings of the 11th international conference on Information Security
A mobile device management framework for secure service delivery
Information Security Tech. Report
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Automated Device Pairing for Asymmetric Pairing Scenarios
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Bootstrapping trust in a "trusted" platform
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Using audio in secure device pairing
International Journal of Security and Networks
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Information Systems Frontiers
Un espace de classification pour l'interaction sur dispositifs mobiles
IHM '07 Proceedings of the 19th International Conference of the Association Francophone d'Interaction Homme-Machine
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Point&Connect: intention-based device pairing for mobile phone users
Proceedings of the 7th international conference on Mobile systems, applications, and services
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
A hybrid GA-PSO fuzzy system for user identification on smart phones
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Serial hook-ups: a comparative usability study of secure device pairing methods
Proceedings of the 5th Symposium on Usable Privacy and Security
Usability and security of out-of-band channels in secure device pairing protocols
Proceedings of the 5th Symposium on Usable Privacy and Security
Tagging the Turtle: Local Attestation for Kiosk Computing
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Information protection via environmental data tethers
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Authenticating ubiquitous services: a study of wireless hotspot access
Proceedings of the 11th international conference on Ubiquitous computing
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Using a personal device to strengthen password authentication from an untrusted computer
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Usability analysis of secure pairing methods
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Efficient device pairing using "Human-comparable" synchronized audiovisual patterns
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
IEEE Journal on Selected Areas in Communications
Group device pairing based secure sensor association and key management for body area networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
Influence of user perception, security needs, and social factors on device pairing method choices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Visualizing your key for secure phone calls and language independence
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
Authentication technologies for the blind or visually impaired
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Groupthink: usability of secure group association for wireless devices
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 17th ACM conference on Computer and communications security
Securing interactive sessions using mobile device through visual channel and visual inspection
Proceedings of the 26th Annual Computer Security Applications Conference
A concept for a first communication initiation for ambient intelligent industrial environments
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Authentication on public terminals with private devices
Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction
An approach to introducing locality in remote attestation using near field communications
The Journal of Supercomputing
Multi-channel key agreement using encrypted public key exchange
Proceedings of the 15th international conference on Security protocols
A framework for secure device pairing by demonstration of physical proximity
Proceedings of the 8th International Conference on Frontiers of Information Technology
How users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Pairing devices for social interactions: a comparative usability evaluation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using a spatial context authentication proxy for establishing secure wireless connections
Journal of Mobile Multimedia
Home-network threats and access controls
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Secure in-band wireless pairing
SEC'11 Proceedings of the 20th USENIX conference on Security
PorKI: portable PKI credentials via proxy certificates
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Secure negotiation for manual authentication protocols
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Using mobile device screens for authentication
Proceedings of the 23rd Australian Computer-Human Interaction Conference
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Proceedings of the 27th Annual Computer Security Applications Conference
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Phoolproof phishing prevention
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Instant matchmaking: simple and secure integrated ubiquitous computing environments
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Two's company, three is a crowd: a group-admission protocol for WSNs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
SP'11 Proceedings of the 19th international conference on Security Protocols
Towards a theory of trust in networks of humans and computers
SP'11 Proceedings of the 19th international conference on Security Protocols
WebTicket: account management using printable tokens
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Contextual OTP: mitigating emerging man-in-the-middle attacks with wireless hardware tokens
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Practical privacy preserving cloud resource-payment for constrained clients
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Feeling is believing: a secure template exchange protocol
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Natural language letter based visual cryptography scheme
Journal of Visual Communication and Image Representation
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Combining social authentication and untrusted clouds for private location sharing
Proceedings of the 18th ACM symposium on Access control models and technologies
MultiNet: reducing interaction overhead in domestic wireless networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Reverse Authentication in Financial Transactions and Identity Management
Mobile Networks and Applications
Secure interaction with piggybacked key-exchange
Pervasive and Mobile Computing
Hi-index | 0.00 |
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze Seeing-Is-Believing, a system that utilizes 2D barcodes and camera-phones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of a trusted path for configuration of a TCG-compliant computing platform, and secure device configuration in the context of a smart home.