Journal articles on the topic 'Secure device pairing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure device pairing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mirzadeh, Shahab, Haitham Cruickshank, and Rahim Tafazolli. "Secure Device Pairing: A Survey." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 17–40. http://dx.doi.org/10.1109/surv.2013.111413.00196.
Annadurai, Soorya, and Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Malkani, Yasir Arfat. "Secure Device Pairing: A Usability Study." International Journal of UbiComp 3, no. 2 (April 30, 2012): 31–46. http://dx.doi.org/10.5121/iju.2012.3203.
Goodrich, Michael T., Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, and Ersin Uzun. "Using audio in secure device pairing." International Journal of Security and Networks 4, no. 1/2 (2009): 57. http://dx.doi.org/10.1504/ijsn.2009.023426.
Guo, Zhenge, Xueguang Gao, Qiang Ma, and Jizhong Zhao. "Secure device pairing via handshake detection." Tsinghua Science and Technology 23, no. 5 (October 2018): 621–33. http://dx.doi.org/10.26599/tst.2018.9010085.
Fomichev, Mikhail, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, and Matthias Hollick. "Survey and Systematization of Secure Device Pairing." IEEE Communications Surveys & Tutorials 20, no. 1 (2018): 517–50. http://dx.doi.org/10.1109/comst.2017.2748278.
Kumar, Arun, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. "A comparative study of secure device pairing methods." Pervasive and Mobile Computing 5, no. 6 (December 2009): 734–49. http://dx.doi.org/10.1016/j.pmcj.2009.07.008.
Malkani, Yasir Arfat, Moez Ahmed Malik, Lachhman Das Dhomeja, Bisharat Rasool Memon, and Abdul Waheed Mahesar. "A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks." Sukkur IBA Journal of Computing and Mathematical Sciences 5, no. 1 (April 27, 2021): 73–88. http://dx.doi.org/10.30537/sjcms.v5i1.806.
Shi, Congcong, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song, and Sanglu Lu. "Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking." Wireless Communications and Mobile Computing 2021 (April 2, 2021): 1–15. http://dx.doi.org/10.1155/2021/6668478.
Khalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma, and Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey." Wireless Communications and Mobile Computing 2021 (January 28, 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Peltonen, Aleksi, Mohit Sethi, and Tuomas Aura. "Formal verification of misbinding attacks on secure device pairing and bootstrapping." Journal of Information Security and Applications 51 (April 2020): 102461. http://dx.doi.org/10.1016/j.jisa.2020.102461.
Wahaballa, Abubaker. "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme." Electronics 11, no. 21 (October 25, 2022): 3445. http://dx.doi.org/10.3390/electronics11213445.
Sun, Da-Zhi, Li Sun, and Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy." Sensors 19, no. 15 (July 24, 2019): 3259. http://dx.doi.org/10.3390/s19153259.
Saxena, Nitesh, Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan. "Secure Device Pairing Based on a Visual Channel: Design and Usability Study." IEEE Transactions on Information Forensics and Security 6, no. 1 (March 2011): 28–38. http://dx.doi.org/10.1109/tifs.2010.2096217.
Anistoroaei, Alfred, Adriana Berdich, Patricia Iosif, and Bogdan Groza. "Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems." Applied Sciences 11, no. 19 (October 6, 2021): 9276. http://dx.doi.org/10.3390/app11199276.
Nagatomo, Makoto, Kentaro Aburada, Naonobu Okazaki, and Mirang Park. "Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker." International Journal of Networking and Computing 9, no. 2 (2019): 318–38. http://dx.doi.org/10.15803/ijnc.9.2_318.
Thakare, Abhijeet, and Young-Gab Kim. "Secure and Efficient Authentication Scheme in IoT Environments." Applied Sciences 11, no. 3 (January 29, 2021): 1260. http://dx.doi.org/10.3390/app11031260.
Wang, Huawei, Ye Li, Yingnan Jiao, and Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
M. Allam, Ali. "Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks." International Journal of Computer Science and Information Technology 13, no. 5 (October 31, 2021): 49–57. http://dx.doi.org/10.5121/ijcsit.2021.13504.
Braeken, An. "PUF Based Authentication Protocol for IoT." Symmetry 10, no. 8 (August 20, 2018): 352. http://dx.doi.org/10.3390/sym10080352.
Konan, Martin, and Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN." Sensors 19, no. 7 (April 3, 2019): 1608. http://dx.doi.org/10.3390/s19071608.
Miao, Yuchen, Chaojie Gu, Zhenyu Yan, Sze Yiu Chau, Rui Tan, Qi Lin, Wen Hu, Shibo He, and Jiming Chen. "TouchKey." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, no. 2 (June 12, 2023): 1–21. http://dx.doi.org/10.1145/3596264.
Al-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam, and Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network." Symmetry 12, no. 10 (October 14, 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Chatzoglou, Efstratios, Georgios Kambourakis, and Christos Smiliotopoulos. "Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny." Sensors 22, no. 2 (January 10, 2022): 513. http://dx.doi.org/10.3390/s22020513.
Akila, K. "Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service." Scientific Temper 14, no. 04 (December 27, 2023): 1404–11. http://dx.doi.org/10.58414/scientifictemper.2023.14.4.51.
Ding, Yong, Hui Xu, Meng Zhao, Hai Liang, and Yujue Wang. "Group authentication and key distribution for sensors in wireless body area network." International Journal of Distributed Sensor Networks 17, no. 9 (September 2021): 155014772110443. http://dx.doi.org/10.1177/15501477211044338.
Padhya, Mukti, and Devesh C. Jinwala. "R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption." Data Science and Engineering 5, no. 4 (August 6, 2020): 391–418. http://dx.doi.org/10.1007/s41019-020-00136-y.
Jeon, Seong-Yun, and Mun-Kyu Lee. "Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification." Sensors 21, no. 8 (April 19, 2021): 2859. http://dx.doi.org/10.3390/s21082859.
Soriente, Claudio, Gene Tsudik, and Ersin Uzun. "Secure pairing of interface constrained devices." International Journal of Security and Networks 4, no. 1/2 (2009): 17. http://dx.doi.org/10.1504/ijsn.2009.023423.
Huang, Xin, Haotian Yin, Xin Zhang, Di Zhang, Sheng Chai, Bin Xing, Jie Zhang, Xiaoling Yu, Yu Zhou, and Haixia Zheng. "Efficient and Secure Pairing Protocol for Devices with Unbalanced Computational Capabilities." Mathematics 10, no. 14 (July 13, 2022): 2447. http://dx.doi.org/10.3390/math10142447.
Gopalakrishnan, Prakash, and B. Uma Maheswari. "Keyless Cryptosystem for Secure Primitive Pairing of Mobile Devices." Journal of Computational and Theoretical Nanoscience 15, no. 5 (May 1, 2018): 1607–14. http://dx.doi.org/10.1166/jctn.2018.7349.
Senthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (July 17, 2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Groza, Bogdan, Adriana Berdich, Camil Jichici, and Rene Mayrhofer. "Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport." IEEE Access 8 (2020): 9246–59. http://dx.doi.org/10.1109/access.2020.2964151.
Cui, Weirong, Chenglie Du, and Jinchao Chen. "PSP: proximity-based secure pairing of mobile devices using WiFi signals." Wireless Networks 25, no. 2 (September 26, 2017): 733–51. http://dx.doi.org/10.1007/s11276-017-1588-9.
Mayrhofer, R., and H. Gellersen. "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices." IEEE Transactions on Mobile Computing 8, no. 6 (June 2009): 792–806. http://dx.doi.org/10.1109/tmc.2009.51.
Liu, Dong, Jing Chen, Qisi Deng, Arouna Konate, and Zairong Tian. "Secure pairing with wearable devices by using ambient sound and light." Wuhan University Journal of Natural Sciences 22, no. 4 (July 15, 2017): 329–36. http://dx.doi.org/10.1007/s11859-017-1255-0.
Thumbur, Gowri, G. Srinivasa Rao, P. Vasudeva Reddy, N. B. Gayathri, and D. V. Rama Koti Reddy. "Efficient Pairing-Free Certificateless Signature Scheme for Secure Communication in Resource-Constrained Devices." IEEE Communications Letters 24, no. 8 (August 2020): 1641–45. http://dx.doi.org/10.1109/lcomm.2020.2988818.
Jiang, Qi, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma, and Jianfeng Ma. "Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices." IEEE Internet of Things Journal 6, no. 3 (June 2019): 5618–30. http://dx.doi.org/10.1109/jiot.2019.2904177.
Wang, Guilin, Hua Shen, Liquan Chen, Jinguang Han, and Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks." Electronics 12, no. 23 (December 2, 2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Silva-Trujillo, Alejandra Guadalupe, Mauricio Jacobo González González, Luis Pablo Rocha Pérez, and Luis Javier García Villalba. "Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack." Sensors 23, no. 12 (June 8, 2023): 5438. http://dx.doi.org/10.3390/s23125438.
Yan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang, and Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing." Electronics 13, no. 3 (January 29, 2024): 534. http://dx.doi.org/10.3390/electronics13030534.
Ullah, Insaf, Abdullah Alomari, Noor Ul Amin, Muhammad Asghar Khan, and Hizbullah Khattak. "An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things." Electronics 8, no. 10 (October 16, 2019): 1171. http://dx.doi.org/10.3390/electronics8101171.
Tsai, Jia-Lun, and Nai-Wei Lo. "Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings." Wireless Personal Communications 83, no. 2 (February 28, 2015): 1273–86. http://dx.doi.org/10.1007/s11277-015-2449-4.
Sun, Da-Zhi, and Li Sun. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications." Sensors 19, no. 5 (March 7, 2019): 1158. http://dx.doi.org/10.3390/s19051158.
Guo, Rui, Qiaoyan Wen, Zhengping Jin, and Hua Zhang. "An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks." Scientific World Journal 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/761240.
Kim, Hyunsung, and Sung Woon Lee. "Secure Energy Efficient Data Collection Scheme Over Wireless Multimedia Sensor Networks." Journal of Computational and Theoretical Nanoscience 13, no. 10 (October 1, 2016): 7375–84. http://dx.doi.org/10.1166/jctn.2016.5729.
Li, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, and He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing." Sensors 20, no. 17 (August 21, 2020): 4720. http://dx.doi.org/10.3390/s20174720.
Yang, Lei, Yeh-Cheng Chen, and Tsu-Yang Wu. "Provably Secure Client-Server Key Management Scheme in 5G Networks." Wireless Communications and Mobile Computing 2021 (October 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/4083199.
Khan, Shahzad, Waseem Iqbal, Abdul Waheed, Gulzar Mehmood, Shawal Khan, Mahdi Zareei, and Rajesh Roshan Biswal. "An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society." Sensors 22, no. 1 (January 3, 2022): 336. http://dx.doi.org/10.3390/s22010336.
Yu, Binbin, and Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.