Artykuły w czasopismach na temat „Secure device pairing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Secure device pairing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Mirzadeh, Shahab, Haitham Cruickshank i Rahim Tafazolli. "Secure Device Pairing: A Survey". IEEE Communications Surveys & Tutorials 16, nr 1 (2014): 17–40. http://dx.doi.org/10.1109/surv.2013.111413.00196.
Pełny tekst źródłaAnnadurai, Soorya, i Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations". Journal of Computational and Theoretical Nanoscience 17, nr 1 (1.01.2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Pełny tekst źródłaMalkani, Yasir Arfat. "Secure Device Pairing: A Usability Study". International Journal of UbiComp 3, nr 2 (30.04.2012): 31–46. http://dx.doi.org/10.5121/iju.2012.3203.
Pełny tekst źródłaGoodrich, Michael T., Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik i Ersin Uzun. "Using audio in secure device pairing". International Journal of Security and Networks 4, nr 1/2 (2009): 57. http://dx.doi.org/10.1504/ijsn.2009.023426.
Pełny tekst źródłaGuo, Zhenge, Xueguang Gao, Qiang Ma i Jizhong Zhao. "Secure device pairing via handshake detection". Tsinghua Science and Technology 23, nr 5 (październik 2018): 621–33. http://dx.doi.org/10.26599/tst.2018.9010085.
Pełny tekst źródłaFomichev, Mikhail, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen i Matthias Hollick. "Survey and Systematization of Secure Device Pairing". IEEE Communications Surveys & Tutorials 20, nr 1 (2018): 517–50. http://dx.doi.org/10.1109/comst.2017.2748278.
Pełny tekst źródłaKumar, Arun, Nitesh Saxena, Gene Tsudik i Ersin Uzun. "A comparative study of secure device pairing methods". Pervasive and Mobile Computing 5, nr 6 (grudzień 2009): 734–49. http://dx.doi.org/10.1016/j.pmcj.2009.07.008.
Pełny tekst źródłaMalkani, Yasir Arfat, Moez Ahmed Malik, Lachhman Das Dhomeja, Bisharat Rasool Memon i Abdul Waheed Mahesar. "A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks". Sukkur IBA Journal of Computing and Mathematical Sciences 5, nr 1 (27.04.2021): 73–88. http://dx.doi.org/10.30537/sjcms.v5i1.806.
Pełny tekst źródłaShi, Congcong, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song i Sanglu Lu. "Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking". Wireless Communications and Mobile Computing 2021 (2.04.2021): 1–15. http://dx.doi.org/10.1155/2021/6668478.
Pełny tekst źródłaKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma i Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey". Wireless Communications and Mobile Computing 2021 (28.01.2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Pełny tekst źródłaPeltonen, Aleksi, Mohit Sethi i Tuomas Aura. "Formal verification of misbinding attacks on secure device pairing and bootstrapping". Journal of Information Security and Applications 51 (kwiecień 2020): 102461. http://dx.doi.org/10.1016/j.jisa.2020.102461.
Pełny tekst źródłaWahaballa, Abubaker. "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme". Electronics 11, nr 21 (25.10.2022): 3445. http://dx.doi.org/10.3390/electronics11213445.
Pełny tekst źródłaSun, Da-Zhi, Li Sun i Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy". Sensors 19, nr 15 (24.07.2019): 3259. http://dx.doi.org/10.3390/s19153259.
Pełny tekst źródłaSaxena, Nitesh, Jan-Erik Ekberg, Kari Kostiainen i N. Asokan. "Secure Device Pairing Based on a Visual Channel: Design and Usability Study". IEEE Transactions on Information Forensics and Security 6, nr 1 (marzec 2011): 28–38. http://dx.doi.org/10.1109/tifs.2010.2096217.
Pełny tekst źródłaAnistoroaei, Alfred, Adriana Berdich, Patricia Iosif i Bogdan Groza. "Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems". Applied Sciences 11, nr 19 (6.10.2021): 9276. http://dx.doi.org/10.3390/app11199276.
Pełny tekst źródłaNagatomo, Makoto, Kentaro Aburada, Naonobu Okazaki i Mirang Park. "Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker". International Journal of Networking and Computing 9, nr 2 (2019): 318–38. http://dx.doi.org/10.15803/ijnc.9.2_318.
Pełny tekst źródłaThakare, Abhijeet, i Young-Gab Kim. "Secure and Efficient Authentication Scheme in IoT Environments". Applied Sciences 11, nr 3 (29.01.2021): 1260. http://dx.doi.org/10.3390/app11031260.
Pełny tekst źródłaWang, Huawei, Ye Li, Yingnan Jiao i Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network". International Journal of Distributed Sensor Networks 15, nr 7 (lipiec 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Pełny tekst źródłaM. Allam, Ali. "Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks". International Journal of Computer Science and Information Technology 13, nr 5 (31.10.2021): 49–57. http://dx.doi.org/10.5121/ijcsit.2021.13504.
Pełny tekst źródłaBraeken, An. "PUF Based Authentication Protocol for IoT". Symmetry 10, nr 8 (20.08.2018): 352. http://dx.doi.org/10.3390/sym10080352.
Pełny tekst źródłaKonan, Martin, i Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN". Sensors 19, nr 7 (3.04.2019): 1608. http://dx.doi.org/10.3390/s19071608.
Pełny tekst źródłaMiao, Yuchen, Chaojie Gu, Zhenyu Yan, Sze Yiu Chau, Rui Tan, Qi Lin, Wen Hu, Shibo He i Jiming Chen. "TouchKey". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, nr 2 (12.06.2023): 1–21. http://dx.doi.org/10.1145/3596264.
Pełny tekst źródłaAl-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam i Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network". Symmetry 12, nr 10 (14.10.2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Pełny tekst źródłaChatzoglou, Efstratios, Georgios Kambourakis i Christos Smiliotopoulos. "Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny". Sensors 22, nr 2 (10.01.2022): 513. http://dx.doi.org/10.3390/s22020513.
Pełny tekst źródłaAkila, K. "Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service". Scientific Temper 14, nr 04 (27.12.2023): 1404–11. http://dx.doi.org/10.58414/scientifictemper.2023.14.4.51.
Pełny tekst źródłaDing, Yong, Hui Xu, Meng Zhao, Hai Liang i Yujue Wang. "Group authentication and key distribution for sensors in wireless body area network". International Journal of Distributed Sensor Networks 17, nr 9 (wrzesień 2021): 155014772110443. http://dx.doi.org/10.1177/15501477211044338.
Pełny tekst źródłaPadhya, Mukti, i Devesh C. Jinwala. "R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption". Data Science and Engineering 5, nr 4 (6.08.2020): 391–418. http://dx.doi.org/10.1007/s41019-020-00136-y.
Pełny tekst źródłaJeon, Seong-Yun, i Mun-Kyu Lee. "Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification". Sensors 21, nr 8 (19.04.2021): 2859. http://dx.doi.org/10.3390/s21082859.
Pełny tekst źródłaSoriente, Claudio, Gene Tsudik i Ersin Uzun. "Secure pairing of interface constrained devices". International Journal of Security and Networks 4, nr 1/2 (2009): 17. http://dx.doi.org/10.1504/ijsn.2009.023423.
Pełny tekst źródłaHuang, Xin, Haotian Yin, Xin Zhang, Di Zhang, Sheng Chai, Bin Xing, Jie Zhang, Xiaoling Yu, Yu Zhou i Haixia Zheng. "Efficient and Secure Pairing Protocol for Devices with Unbalanced Computational Capabilities". Mathematics 10, nr 14 (13.07.2022): 2447. http://dx.doi.org/10.3390/math10142447.
Pełny tekst źródłaGopalakrishnan, Prakash, i B. Uma Maheswari. "Keyless Cryptosystem for Secure Primitive Pairing of Mobile Devices". Journal of Computational and Theoretical Nanoscience 15, nr 5 (1.05.2018): 1607–14. http://dx.doi.org/10.1166/jctn.2018.7349.
Pełny tekst źródłaSenthil Kumar, T., i S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design". Measurement and Control 52, nr 7-8 (17.07.2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Pełny tekst źródłaGroza, Bogdan, Adriana Berdich, Camil Jichici i Rene Mayrhofer. "Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport". IEEE Access 8 (2020): 9246–59. http://dx.doi.org/10.1109/access.2020.2964151.
Pełny tekst źródłaCui, Weirong, Chenglie Du i Jinchao Chen. "PSP: proximity-based secure pairing of mobile devices using WiFi signals". Wireless Networks 25, nr 2 (26.09.2017): 733–51. http://dx.doi.org/10.1007/s11276-017-1588-9.
Pełny tekst źródłaMayrhofer, R., i H. Gellersen. "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices". IEEE Transactions on Mobile Computing 8, nr 6 (czerwiec 2009): 792–806. http://dx.doi.org/10.1109/tmc.2009.51.
Pełny tekst źródłaLiu, Dong, Jing Chen, Qisi Deng, Arouna Konate i Zairong Tian. "Secure pairing with wearable devices by using ambient sound and light". Wuhan University Journal of Natural Sciences 22, nr 4 (15.07.2017): 329–36. http://dx.doi.org/10.1007/s11859-017-1255-0.
Pełny tekst źródłaThumbur, Gowri, G. Srinivasa Rao, P. Vasudeva Reddy, N. B. Gayathri i D. V. Rama Koti Reddy. "Efficient Pairing-Free Certificateless Signature Scheme for Secure Communication in Resource-Constrained Devices". IEEE Communications Letters 24, nr 8 (sierpień 2020): 1641–45. http://dx.doi.org/10.1109/lcomm.2020.2988818.
Pełny tekst źródłaJiang, Qi, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma i Jianfeng Ma. "Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices". IEEE Internet of Things Journal 6, nr 3 (czerwiec 2019): 5618–30. http://dx.doi.org/10.1109/jiot.2019.2904177.
Pełny tekst źródłaWang, Guilin, Hua Shen, Liquan Chen, Jinguang Han i Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks". Electronics 12, nr 23 (2.12.2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Pełny tekst źródłaSilva-Trujillo, Alejandra Guadalupe, Mauricio Jacobo González González, Luis Pablo Rocha Pérez i Luis Javier García Villalba. "Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack". Sensors 23, nr 12 (8.06.2023): 5438. http://dx.doi.org/10.3390/s23125438.
Pełny tekst źródłaYan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang i Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing". Electronics 13, nr 3 (29.01.2024): 534. http://dx.doi.org/10.3390/electronics13030534.
Pełny tekst źródłaUllah, Insaf, Abdullah Alomari, Noor Ul Amin, Muhammad Asghar Khan i Hizbullah Khattak. "An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things". Electronics 8, nr 10 (16.10.2019): 1171. http://dx.doi.org/10.3390/electronics8101171.
Pełny tekst źródłaTsai, Jia-Lun, i Nai-Wei Lo. "Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings". Wireless Personal Communications 83, nr 2 (28.02.2015): 1273–86. http://dx.doi.org/10.1007/s11277-015-2449-4.
Pełny tekst źródłaSun, Da-Zhi, i Li Sun. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications". Sensors 19, nr 5 (7.03.2019): 1158. http://dx.doi.org/10.3390/s19051158.
Pełny tekst źródłaGuo, Rui, Qiaoyan Wen, Zhengping Jin i Hua Zhang. "An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks". Scientific World Journal 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/761240.
Pełny tekst źródłaKim, Hyunsung, i Sung Woon Lee. "Secure Energy Efficient Data Collection Scheme Over Wireless Multimedia Sensor Networks". Journal of Computational and Theoretical Nanoscience 13, nr 10 (1.10.2016): 7375–84. http://dx.doi.org/10.1166/jctn.2016.5729.
Pełny tekst źródłaLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li i He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing". Sensors 20, nr 17 (21.08.2020): 4720. http://dx.doi.org/10.3390/s20174720.
Pełny tekst źródłaYang, Lei, Yeh-Cheng Chen i Tsu-Yang Wu. "Provably Secure Client-Server Key Management Scheme in 5G Networks". Wireless Communications and Mobile Computing 2021 (22.10.2021): 1–14. http://dx.doi.org/10.1155/2021/4083199.
Pełny tekst źródłaKhan, Shahzad, Waseem Iqbal, Abdul Waheed, Gulzar Mehmood, Shawal Khan, Mahdi Zareei i Rajesh Roshan Biswal. "An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society". Sensors 22, nr 1 (3.01.2022): 336. http://dx.doi.org/10.3390/s22010336.
Pełny tekst źródłaYu, Binbin, i Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things". International Journal of Distributed Sensor Networks 15, nr 9 (wrzesień 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.
Pełny tekst źródła