Artículos de revistas sobre el tema "Secure device pairing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secure device pairing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Mirzadeh, Shahab, Haitham Cruickshank y Rahim Tafazolli. "Secure Device Pairing: A Survey". IEEE Communications Surveys & Tutorials 16, n.º 1 (2014): 17–40. http://dx.doi.org/10.1109/surv.2013.111413.00196.
Texto completoAnnadurai, Soorya y Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations". Journal of Computational and Theoretical Nanoscience 17, n.º 1 (1 de enero de 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Texto completoMalkani, Yasir Arfat. "Secure Device Pairing: A Usability Study". International Journal of UbiComp 3, n.º 2 (30 de abril de 2012): 31–46. http://dx.doi.org/10.5121/iju.2012.3203.
Texto completoGoodrich, Michael T., Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik y Ersin Uzun. "Using audio in secure device pairing". International Journal of Security and Networks 4, n.º 1/2 (2009): 57. http://dx.doi.org/10.1504/ijsn.2009.023426.
Texto completoGuo, Zhenge, Xueguang Gao, Qiang Ma y Jizhong Zhao. "Secure device pairing via handshake detection". Tsinghua Science and Technology 23, n.º 5 (octubre de 2018): 621–33. http://dx.doi.org/10.26599/tst.2018.9010085.
Texto completoFomichev, Mikhail, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen y Matthias Hollick. "Survey and Systematization of Secure Device Pairing". IEEE Communications Surveys & Tutorials 20, n.º 1 (2018): 517–50. http://dx.doi.org/10.1109/comst.2017.2748278.
Texto completoKumar, Arun, Nitesh Saxena, Gene Tsudik y Ersin Uzun. "A comparative study of secure device pairing methods". Pervasive and Mobile Computing 5, n.º 6 (diciembre de 2009): 734–49. http://dx.doi.org/10.1016/j.pmcj.2009.07.008.
Texto completoMalkani, Yasir Arfat, Moez Ahmed Malik, Lachhman Das Dhomeja, Bisharat Rasool Memon y Abdul Waheed Mahesar. "A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks". Sukkur IBA Journal of Computing and Mathematical Sciences 5, n.º 1 (27 de abril de 2021): 73–88. http://dx.doi.org/10.30537/sjcms.v5i1.806.
Texto completoShi, Congcong, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song y Sanglu Lu. "Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking". Wireless Communications and Mobile Computing 2021 (2 de abril de 2021): 1–15. http://dx.doi.org/10.1155/2021/6668478.
Texto completoKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma y Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey". Wireless Communications and Mobile Computing 2021 (28 de enero de 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Texto completoPeltonen, Aleksi, Mohit Sethi y Tuomas Aura. "Formal verification of misbinding attacks on secure device pairing and bootstrapping". Journal of Information Security and Applications 51 (abril de 2020): 102461. http://dx.doi.org/10.1016/j.jisa.2020.102461.
Texto completoWahaballa, Abubaker. "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme". Electronics 11, n.º 21 (25 de octubre de 2022): 3445. http://dx.doi.org/10.3390/electronics11213445.
Texto completoSun, Da-Zhi, Li Sun y Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy". Sensors 19, n.º 15 (24 de julio de 2019): 3259. http://dx.doi.org/10.3390/s19153259.
Texto completoSaxena, Nitesh, Jan-Erik Ekberg, Kari Kostiainen y N. Asokan. "Secure Device Pairing Based on a Visual Channel: Design and Usability Study". IEEE Transactions on Information Forensics and Security 6, n.º 1 (marzo de 2011): 28–38. http://dx.doi.org/10.1109/tifs.2010.2096217.
Texto completoAnistoroaei, Alfred, Adriana Berdich, Patricia Iosif y Bogdan Groza. "Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems". Applied Sciences 11, n.º 19 (6 de octubre de 2021): 9276. http://dx.doi.org/10.3390/app11199276.
Texto completoNagatomo, Makoto, Kentaro Aburada, Naonobu Okazaki y Mirang Park. "Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker". International Journal of Networking and Computing 9, n.º 2 (2019): 318–38. http://dx.doi.org/10.15803/ijnc.9.2_318.
Texto completoThakare, Abhijeet y Young-Gab Kim. "Secure and Efficient Authentication Scheme in IoT Environments". Applied Sciences 11, n.º 3 (29 de enero de 2021): 1260. http://dx.doi.org/10.3390/app11031260.
Texto completoWang, Huawei, Ye Li, Yingnan Jiao y Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network". International Journal of Distributed Sensor Networks 15, n.º 7 (julio de 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Texto completoM. Allam, Ali. "Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks". International Journal of Computer Science and Information Technology 13, n.º 5 (31 de octubre de 2021): 49–57. http://dx.doi.org/10.5121/ijcsit.2021.13504.
Texto completoBraeken, An. "PUF Based Authentication Protocol for IoT". Symmetry 10, n.º 8 (20 de agosto de 2018): 352. http://dx.doi.org/10.3390/sym10080352.
Texto completoKonan, Martin y Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN". Sensors 19, n.º 7 (3 de abril de 2019): 1608. http://dx.doi.org/10.3390/s19071608.
Texto completoMiao, Yuchen, Chaojie Gu, Zhenyu Yan, Sze Yiu Chau, Rui Tan, Qi Lin, Wen Hu, Shibo He y Jiming Chen. "TouchKey". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, n.º 2 (12 de junio de 2023): 1–21. http://dx.doi.org/10.1145/3596264.
Texto completoAl-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam y Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network". Symmetry 12, n.º 10 (14 de octubre de 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Texto completoChatzoglou, Efstratios, Georgios Kambourakis y Christos Smiliotopoulos. "Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny". Sensors 22, n.º 2 (10 de enero de 2022): 513. http://dx.doi.org/10.3390/s22020513.
Texto completoAkila, K. "Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service". Scientific Temper 14, n.º 04 (27 de diciembre de 2023): 1404–11. http://dx.doi.org/10.58414/scientifictemper.2023.14.4.51.
Texto completoDing, Yong, Hui Xu, Meng Zhao, Hai Liang y Yujue Wang. "Group authentication and key distribution for sensors in wireless body area network". International Journal of Distributed Sensor Networks 17, n.º 9 (septiembre de 2021): 155014772110443. http://dx.doi.org/10.1177/15501477211044338.
Texto completoPadhya, Mukti y Devesh C. Jinwala. "R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption". Data Science and Engineering 5, n.º 4 (6 de agosto de 2020): 391–418. http://dx.doi.org/10.1007/s41019-020-00136-y.
Texto completoJeon, Seong-Yun y Mun-Kyu Lee. "Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification". Sensors 21, n.º 8 (19 de abril de 2021): 2859. http://dx.doi.org/10.3390/s21082859.
Texto completoSoriente, Claudio, Gene Tsudik y Ersin Uzun. "Secure pairing of interface constrained devices". International Journal of Security and Networks 4, n.º 1/2 (2009): 17. http://dx.doi.org/10.1504/ijsn.2009.023423.
Texto completoHuang, Xin, Haotian Yin, Xin Zhang, Di Zhang, Sheng Chai, Bin Xing, Jie Zhang, Xiaoling Yu, Yu Zhou y Haixia Zheng. "Efficient and Secure Pairing Protocol for Devices with Unbalanced Computational Capabilities". Mathematics 10, n.º 14 (13 de julio de 2022): 2447. http://dx.doi.org/10.3390/math10142447.
Texto completoGopalakrishnan, Prakash y B. Uma Maheswari. "Keyless Cryptosystem for Secure Primitive Pairing of Mobile Devices". Journal of Computational and Theoretical Nanoscience 15, n.º 5 (1 de mayo de 2018): 1607–14. http://dx.doi.org/10.1166/jctn.2018.7349.
Texto completoSenthil Kumar, T. y S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design". Measurement and Control 52, n.º 7-8 (17 de julio de 2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Texto completoGroza, Bogdan, Adriana Berdich, Camil Jichici y Rene Mayrhofer. "Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport". IEEE Access 8 (2020): 9246–59. http://dx.doi.org/10.1109/access.2020.2964151.
Texto completoCui, Weirong, Chenglie Du y Jinchao Chen. "PSP: proximity-based secure pairing of mobile devices using WiFi signals". Wireless Networks 25, n.º 2 (26 de septiembre de 2017): 733–51. http://dx.doi.org/10.1007/s11276-017-1588-9.
Texto completoMayrhofer, R. y H. Gellersen. "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices". IEEE Transactions on Mobile Computing 8, n.º 6 (junio de 2009): 792–806. http://dx.doi.org/10.1109/tmc.2009.51.
Texto completoLiu, Dong, Jing Chen, Qisi Deng, Arouna Konate y Zairong Tian. "Secure pairing with wearable devices by using ambient sound and light". Wuhan University Journal of Natural Sciences 22, n.º 4 (15 de julio de 2017): 329–36. http://dx.doi.org/10.1007/s11859-017-1255-0.
Texto completoThumbur, Gowri, G. Srinivasa Rao, P. Vasudeva Reddy, N. B. Gayathri y D. V. Rama Koti Reddy. "Efficient Pairing-Free Certificateless Signature Scheme for Secure Communication in Resource-Constrained Devices". IEEE Communications Letters 24, n.º 8 (agosto de 2020): 1641–45. http://dx.doi.org/10.1109/lcomm.2020.2988818.
Texto completoJiang, Qi, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma y Jianfeng Ma. "Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices". IEEE Internet of Things Journal 6, n.º 3 (junio de 2019): 5618–30. http://dx.doi.org/10.1109/jiot.2019.2904177.
Texto completoWang, Guilin, Hua Shen, Liquan Chen, Jinguang Han y Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks". Electronics 12, n.º 23 (2 de diciembre de 2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Texto completoSilva-Trujillo, Alejandra Guadalupe, Mauricio Jacobo González González, Luis Pablo Rocha Pérez y Luis Javier García Villalba. "Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack". Sensors 23, n.º 12 (8 de junio de 2023): 5438. http://dx.doi.org/10.3390/s23125438.
Texto completoYan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang y Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing". Electronics 13, n.º 3 (29 de enero de 2024): 534. http://dx.doi.org/10.3390/electronics13030534.
Texto completoUllah, Insaf, Abdullah Alomari, Noor Ul Amin, Muhammad Asghar Khan y Hizbullah Khattak. "An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things". Electronics 8, n.º 10 (16 de octubre de 2019): 1171. http://dx.doi.org/10.3390/electronics8101171.
Texto completoTsai, Jia-Lun y Nai-Wei Lo. "Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings". Wireless Personal Communications 83, n.º 2 (28 de febrero de 2015): 1273–86. http://dx.doi.org/10.1007/s11277-015-2449-4.
Texto completoSun, Da-Zhi y Li Sun. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications". Sensors 19, n.º 5 (7 de marzo de 2019): 1158. http://dx.doi.org/10.3390/s19051158.
Texto completoGuo, Rui, Qiaoyan Wen, Zhengping Jin y Hua Zhang. "An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks". Scientific World Journal 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/761240.
Texto completoKim, Hyunsung y Sung Woon Lee. "Secure Energy Efficient Data Collection Scheme Over Wireless Multimedia Sensor Networks". Journal of Computational and Theoretical Nanoscience 13, n.º 10 (1 de octubre de 2016): 7375–84. http://dx.doi.org/10.1166/jctn.2016.5729.
Texto completoLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li y He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing". Sensors 20, n.º 17 (21 de agosto de 2020): 4720. http://dx.doi.org/10.3390/s20174720.
Texto completoYang, Lei, Yeh-Cheng Chen y Tsu-Yang Wu. "Provably Secure Client-Server Key Management Scheme in 5G Networks". Wireless Communications and Mobile Computing 2021 (22 de octubre de 2021): 1–14. http://dx.doi.org/10.1155/2021/4083199.
Texto completoKhan, Shahzad, Waseem Iqbal, Abdul Waheed, Gulzar Mehmood, Shawal Khan, Mahdi Zareei y Rajesh Roshan Biswal. "An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society". Sensors 22, n.º 1 (3 de enero de 2022): 336. http://dx.doi.org/10.3390/s22010336.
Texto completoYu, Binbin y Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things". International Journal of Distributed Sensor Networks 15, n.º 9 (septiembre de 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.
Texto completo