Articoli di riviste sul tema "Secure device pairing"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Secure device pairing".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Mirzadeh, Shahab, Haitham Cruickshank e Rahim Tafazolli. "Secure Device Pairing: A Survey". IEEE Communications Surveys & Tutorials 16, n. 1 (2014): 17–40. http://dx.doi.org/10.1109/surv.2013.111413.00196.
Annadurai, Soorya, e Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations". Journal of Computational and Theoretical Nanoscience 17, n. 1 (1 gennaio 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Malkani, Yasir Arfat. "Secure Device Pairing: A Usability Study". International Journal of UbiComp 3, n. 2 (30 aprile 2012): 31–46. http://dx.doi.org/10.5121/iju.2012.3203.
Goodrich, Michael T., Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik e Ersin Uzun. "Using audio in secure device pairing". International Journal of Security and Networks 4, n. 1/2 (2009): 57. http://dx.doi.org/10.1504/ijsn.2009.023426.
Guo, Zhenge, Xueguang Gao, Qiang Ma e Jizhong Zhao. "Secure device pairing via handshake detection". Tsinghua Science and Technology 23, n. 5 (ottobre 2018): 621–33. http://dx.doi.org/10.26599/tst.2018.9010085.
Fomichev, Mikhail, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen e Matthias Hollick. "Survey and Systematization of Secure Device Pairing". IEEE Communications Surveys & Tutorials 20, n. 1 (2018): 517–50. http://dx.doi.org/10.1109/comst.2017.2748278.
Kumar, Arun, Nitesh Saxena, Gene Tsudik e Ersin Uzun. "A comparative study of secure device pairing methods". Pervasive and Mobile Computing 5, n. 6 (dicembre 2009): 734–49. http://dx.doi.org/10.1016/j.pmcj.2009.07.008.
Malkani, Yasir Arfat, Moez Ahmed Malik, Lachhman Das Dhomeja, Bisharat Rasool Memon e Abdul Waheed Mahesar. "A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks". Sukkur IBA Journal of Computing and Mathematical Sciences 5, n. 1 (27 aprile 2021): 73–88. http://dx.doi.org/10.30537/sjcms.v5i1.806.
Shi, Congcong, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song e Sanglu Lu. "Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking". Wireless Communications and Mobile Computing 2021 (2 aprile 2021): 1–15. http://dx.doi.org/10.1155/2021/6668478.
Khalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma e Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey". Wireless Communications and Mobile Computing 2021 (28 gennaio 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Peltonen, Aleksi, Mohit Sethi e Tuomas Aura. "Formal verification of misbinding attacks on secure device pairing and bootstrapping". Journal of Information Security and Applications 51 (aprile 2020): 102461. http://dx.doi.org/10.1016/j.jisa.2020.102461.
Wahaballa, Abubaker. "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme". Electronics 11, n. 21 (25 ottobre 2022): 3445. http://dx.doi.org/10.3390/electronics11213445.
Sun, Da-Zhi, Li Sun e Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy". Sensors 19, n. 15 (24 luglio 2019): 3259. http://dx.doi.org/10.3390/s19153259.
Saxena, Nitesh, Jan-Erik Ekberg, Kari Kostiainen e N. Asokan. "Secure Device Pairing Based on a Visual Channel: Design and Usability Study". IEEE Transactions on Information Forensics and Security 6, n. 1 (marzo 2011): 28–38. http://dx.doi.org/10.1109/tifs.2010.2096217.
Anistoroaei, Alfred, Adriana Berdich, Patricia Iosif e Bogdan Groza. "Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems". Applied Sciences 11, n. 19 (6 ottobre 2021): 9276. http://dx.doi.org/10.3390/app11199276.
Nagatomo, Makoto, Kentaro Aburada, Naonobu Okazaki e Mirang Park. "Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker". International Journal of Networking and Computing 9, n. 2 (2019): 318–38. http://dx.doi.org/10.15803/ijnc.9.2_318.
Thakare, Abhijeet, e Young-Gab Kim. "Secure and Efficient Authentication Scheme in IoT Environments". Applied Sciences 11, n. 3 (29 gennaio 2021): 1260. http://dx.doi.org/10.3390/app11031260.
Wang, Huawei, Ye Li, Yingnan Jiao e Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network". International Journal of Distributed Sensor Networks 15, n. 7 (luglio 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
M. Allam, Ali. "Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks". International Journal of Computer Science and Information Technology 13, n. 5 (31 ottobre 2021): 49–57. http://dx.doi.org/10.5121/ijcsit.2021.13504.
Braeken, An. "PUF Based Authentication Protocol for IoT". Symmetry 10, n. 8 (20 agosto 2018): 352. http://dx.doi.org/10.3390/sym10080352.
Konan, Martin, e Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN". Sensors 19, n. 7 (3 aprile 2019): 1608. http://dx.doi.org/10.3390/s19071608.
Miao, Yuchen, Chaojie Gu, Zhenyu Yan, Sze Yiu Chau, Rui Tan, Qi Lin, Wen Hu, Shibo He e Jiming Chen. "TouchKey". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, n. 2 (12 giugno 2023): 1–21. http://dx.doi.org/10.1145/3596264.
Al-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam e Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network". Symmetry 12, n. 10 (14 ottobre 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Chatzoglou, Efstratios, Georgios Kambourakis e Christos Smiliotopoulos. "Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny". Sensors 22, n. 2 (10 gennaio 2022): 513. http://dx.doi.org/10.3390/s22020513.
Akila, K. "Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service". Scientific Temper 14, n. 04 (27 dicembre 2023): 1404–11. http://dx.doi.org/10.58414/scientifictemper.2023.14.4.51.
Ding, Yong, Hui Xu, Meng Zhao, Hai Liang e Yujue Wang. "Group authentication and key distribution for sensors in wireless body area network". International Journal of Distributed Sensor Networks 17, n. 9 (settembre 2021): 155014772110443. http://dx.doi.org/10.1177/15501477211044338.
Padhya, Mukti, e Devesh C. Jinwala. "R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption". Data Science and Engineering 5, n. 4 (6 agosto 2020): 391–418. http://dx.doi.org/10.1007/s41019-020-00136-y.
Jeon, Seong-Yun, e Mun-Kyu Lee. "Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification". Sensors 21, n. 8 (19 aprile 2021): 2859. http://dx.doi.org/10.3390/s21082859.
Soriente, Claudio, Gene Tsudik e Ersin Uzun. "Secure pairing of interface constrained devices". International Journal of Security and Networks 4, n. 1/2 (2009): 17. http://dx.doi.org/10.1504/ijsn.2009.023423.
Huang, Xin, Haotian Yin, Xin Zhang, Di Zhang, Sheng Chai, Bin Xing, Jie Zhang, Xiaoling Yu, Yu Zhou e Haixia Zheng. "Efficient and Secure Pairing Protocol for Devices with Unbalanced Computational Capabilities". Mathematics 10, n. 14 (13 luglio 2022): 2447. http://dx.doi.org/10.3390/math10142447.
Gopalakrishnan, Prakash, e B. Uma Maheswari. "Keyless Cryptosystem for Secure Primitive Pairing of Mobile Devices". Journal of Computational and Theoretical Nanoscience 15, n. 5 (1 maggio 2018): 1607–14. http://dx.doi.org/10.1166/jctn.2018.7349.
Senthil Kumar, T., e S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design". Measurement and Control 52, n. 7-8 (17 luglio 2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Groza, Bogdan, Adriana Berdich, Camil Jichici e Rene Mayrhofer. "Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport". IEEE Access 8 (2020): 9246–59. http://dx.doi.org/10.1109/access.2020.2964151.
Cui, Weirong, Chenglie Du e Jinchao Chen. "PSP: proximity-based secure pairing of mobile devices using WiFi signals". Wireless Networks 25, n. 2 (26 settembre 2017): 733–51. http://dx.doi.org/10.1007/s11276-017-1588-9.
Mayrhofer, R., e H. Gellersen. "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices". IEEE Transactions on Mobile Computing 8, n. 6 (giugno 2009): 792–806. http://dx.doi.org/10.1109/tmc.2009.51.
Liu, Dong, Jing Chen, Qisi Deng, Arouna Konate e Zairong Tian. "Secure pairing with wearable devices by using ambient sound and light". Wuhan University Journal of Natural Sciences 22, n. 4 (15 luglio 2017): 329–36. http://dx.doi.org/10.1007/s11859-017-1255-0.
Thumbur, Gowri, G. Srinivasa Rao, P. Vasudeva Reddy, N. B. Gayathri e D. V. Rama Koti Reddy. "Efficient Pairing-Free Certificateless Signature Scheme for Secure Communication in Resource-Constrained Devices". IEEE Communications Letters 24, n. 8 (agosto 2020): 1641–45. http://dx.doi.org/10.1109/lcomm.2020.2988818.
Jiang, Qi, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma e Jianfeng Ma. "Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices". IEEE Internet of Things Journal 6, n. 3 (giugno 2019): 5618–30. http://dx.doi.org/10.1109/jiot.2019.2904177.
Wang, Guilin, Hua Shen, Liquan Chen, Jinguang Han e Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks". Electronics 12, n. 23 (2 dicembre 2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Silva-Trujillo, Alejandra Guadalupe, Mauricio Jacobo González González, Luis Pablo Rocha Pérez e Luis Javier García Villalba. "Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack". Sensors 23, n. 12 (8 giugno 2023): 5438. http://dx.doi.org/10.3390/s23125438.
Yan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang e Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing". Electronics 13, n. 3 (29 gennaio 2024): 534. http://dx.doi.org/10.3390/electronics13030534.
Ullah, Insaf, Abdullah Alomari, Noor Ul Amin, Muhammad Asghar Khan e Hizbullah Khattak. "An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things". Electronics 8, n. 10 (16 ottobre 2019): 1171. http://dx.doi.org/10.3390/electronics8101171.
Tsai, Jia-Lun, e Nai-Wei Lo. "Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings". Wireless Personal Communications 83, n. 2 (28 febbraio 2015): 1273–86. http://dx.doi.org/10.1007/s11277-015-2449-4.
Sun, Da-Zhi, e Li Sun. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications". Sensors 19, n. 5 (7 marzo 2019): 1158. http://dx.doi.org/10.3390/s19051158.
Guo, Rui, Qiaoyan Wen, Zhengping Jin e Hua Zhang. "An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks". Scientific World Journal 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/761240.
Kim, Hyunsung, e Sung Woon Lee. "Secure Energy Efficient Data Collection Scheme Over Wireless Multimedia Sensor Networks". Journal of Computational and Theoretical Nanoscience 13, n. 10 (1 ottobre 2016): 7375–84. http://dx.doi.org/10.1166/jctn.2016.5729.
Li, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li e He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing". Sensors 20, n. 17 (21 agosto 2020): 4720. http://dx.doi.org/10.3390/s20174720.
Yang, Lei, Yeh-Cheng Chen e Tsu-Yang Wu. "Provably Secure Client-Server Key Management Scheme in 5G Networks". Wireless Communications and Mobile Computing 2021 (22 ottobre 2021): 1–14. http://dx.doi.org/10.1155/2021/4083199.
Khan, Shahzad, Waseem Iqbal, Abdul Waheed, Gulzar Mehmood, Shawal Khan, Mahdi Zareei e Rajesh Roshan Biswal. "An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society". Sensors 22, n. 1 (3 gennaio 2022): 336. http://dx.doi.org/10.3390/s22010336.
Yu, Binbin, e Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things". International Journal of Distributed Sensor Networks 15, n. 9 (settembre 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.