Artigos de revistas sobre o tema "Secure device pairing"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Secure device pairing".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Mirzadeh, Shahab, Haitham Cruickshank e Rahim Tafazolli. "Secure Device Pairing: A Survey". IEEE Communications Surveys & Tutorials 16, n.º 1 (2014): 17–40. http://dx.doi.org/10.1109/surv.2013.111413.00196.
Texto completo da fonteAnnadurai, Soorya, e Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations". Journal of Computational and Theoretical Nanoscience 17, n.º 1 (1 de janeiro de 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Texto completo da fonteMalkani, Yasir Arfat. "Secure Device Pairing: A Usability Study". International Journal of UbiComp 3, n.º 2 (30 de abril de 2012): 31–46. http://dx.doi.org/10.5121/iju.2012.3203.
Texto completo da fonteGoodrich, Michael T., Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik e Ersin Uzun. "Using audio in secure device pairing". International Journal of Security and Networks 4, n.º 1/2 (2009): 57. http://dx.doi.org/10.1504/ijsn.2009.023426.
Texto completo da fonteGuo, Zhenge, Xueguang Gao, Qiang Ma e Jizhong Zhao. "Secure device pairing via handshake detection". Tsinghua Science and Technology 23, n.º 5 (outubro de 2018): 621–33. http://dx.doi.org/10.26599/tst.2018.9010085.
Texto completo da fonteFomichev, Mikhail, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen e Matthias Hollick. "Survey and Systematization of Secure Device Pairing". IEEE Communications Surveys & Tutorials 20, n.º 1 (2018): 517–50. http://dx.doi.org/10.1109/comst.2017.2748278.
Texto completo da fonteKumar, Arun, Nitesh Saxena, Gene Tsudik e Ersin Uzun. "A comparative study of secure device pairing methods". Pervasive and Mobile Computing 5, n.º 6 (dezembro de 2009): 734–49. http://dx.doi.org/10.1016/j.pmcj.2009.07.008.
Texto completo da fonteMalkani, Yasir Arfat, Moez Ahmed Malik, Lachhman Das Dhomeja, Bisharat Rasool Memon e Abdul Waheed Mahesar. "A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks". Sukkur IBA Journal of Computing and Mathematical Sciences 5, n.º 1 (27 de abril de 2021): 73–88. http://dx.doi.org/10.30537/sjcms.v5i1.806.
Texto completo da fonteShi, Congcong, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song e Sanglu Lu. "Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking". Wireless Communications and Mobile Computing 2021 (2 de abril de 2021): 1–15. http://dx.doi.org/10.1155/2021/6668478.
Texto completo da fonteKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma e Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey". Wireless Communications and Mobile Computing 2021 (28 de janeiro de 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Texto completo da fontePeltonen, Aleksi, Mohit Sethi e Tuomas Aura. "Formal verification of misbinding attacks on secure device pairing and bootstrapping". Journal of Information Security and Applications 51 (abril de 2020): 102461. http://dx.doi.org/10.1016/j.jisa.2020.102461.
Texto completo da fonteWahaballa, Abubaker. "Lightweight and Secure IoT-based Payment Protocols from an Identity-Based Signature Scheme". Electronics 11, n.º 21 (25 de outubro de 2022): 3445. http://dx.doi.org/10.3390/electronics11213445.
Texto completo da fonteSun, Da-Zhi, Li Sun e Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy". Sensors 19, n.º 15 (24 de julho de 2019): 3259. http://dx.doi.org/10.3390/s19153259.
Texto completo da fonteSaxena, Nitesh, Jan-Erik Ekberg, Kari Kostiainen e N. Asokan. "Secure Device Pairing Based on a Visual Channel: Design and Usability Study". IEEE Transactions on Information Forensics and Security 6, n.º 1 (março de 2011): 28–38. http://dx.doi.org/10.1109/tifs.2010.2096217.
Texto completo da fonteAnistoroaei, Alfred, Adriana Berdich, Patricia Iosif e Bogdan Groza. "Secure Audio-Visual Data Exchange for Android In-Vehicle Ecosystems". Applied Sciences 11, n.º 19 (6 de outubro de 2021): 9276. http://dx.doi.org/10.3390/app11199276.
Texto completo da fonteNagatomo, Makoto, Kentaro Aburada, Naonobu Okazaki e Mirang Park. "Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker". International Journal of Networking and Computing 9, n.º 2 (2019): 318–38. http://dx.doi.org/10.15803/ijnc.9.2_318.
Texto completo da fonteThakare, Abhijeet, e Young-Gab Kim. "Secure and Efficient Authentication Scheme in IoT Environments". Applied Sciences 11, n.º 3 (29 de janeiro de 2021): 1260. http://dx.doi.org/10.3390/app11031260.
Texto completo da fonteWang, Huawei, Ye Li, Yingnan Jiao e Zhengping Jin. "An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network". International Journal of Distributed Sensor Networks 15, n.º 7 (julho de 2019): 155014771986550. http://dx.doi.org/10.1177/1550147719865507.
Texto completo da fonteM. Allam, Ali. "Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks". International Journal of Computer Science and Information Technology 13, n.º 5 (31 de outubro de 2021): 49–57. http://dx.doi.org/10.5121/ijcsit.2021.13504.
Texto completo da fonteBraeken, An. "PUF Based Authentication Protocol for IoT". Symmetry 10, n.º 8 (20 de agosto de 2018): 352. http://dx.doi.org/10.3390/sym10080352.
Texto completo da fonteKonan, Martin, e Wenyong Wang. "A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN". Sensors 19, n.º 7 (3 de abril de 2019): 1608. http://dx.doi.org/10.3390/s19071608.
Texto completo da fonteMiao, Yuchen, Chaojie Gu, Zhenyu Yan, Sze Yiu Chau, Rui Tan, Qi Lin, Wen Hu, Shibo He e Jiming Chen. "TouchKey". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, n.º 2 (12 de junho de 2023): 1–21. http://dx.doi.org/10.1145/3596264.
Texto completo da fonteAl-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam e Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network". Symmetry 12, n.º 10 (14 de outubro de 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Texto completo da fonteChatzoglou, Efstratios, Georgios Kambourakis e Christos Smiliotopoulos. "Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny". Sensors 22, n.º 2 (10 de janeiro de 2022): 513. http://dx.doi.org/10.3390/s22020513.
Texto completo da fonteAkila, K. "Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service". Scientific Temper 14, n.º 04 (27 de dezembro de 2023): 1404–11. http://dx.doi.org/10.58414/scientifictemper.2023.14.4.51.
Texto completo da fonteDing, Yong, Hui Xu, Meng Zhao, Hai Liang e Yujue Wang. "Group authentication and key distribution for sensors in wireless body area network". International Journal of Distributed Sensor Networks 17, n.º 9 (setembro de 2021): 155014772110443. http://dx.doi.org/10.1177/15501477211044338.
Texto completo da fontePadhya, Mukti, e Devesh C. Jinwala. "R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption". Data Science and Engineering 5, n.º 4 (6 de agosto de 2020): 391–418. http://dx.doi.org/10.1007/s41019-020-00136-y.
Texto completo da fonteJeon, Seong-Yun, e Mun-Kyu Lee. "Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification". Sensors 21, n.º 8 (19 de abril de 2021): 2859. http://dx.doi.org/10.3390/s21082859.
Texto completo da fonteSoriente, Claudio, Gene Tsudik e Ersin Uzun. "Secure pairing of interface constrained devices". International Journal of Security and Networks 4, n.º 1/2 (2009): 17. http://dx.doi.org/10.1504/ijsn.2009.023423.
Texto completo da fonteHuang, Xin, Haotian Yin, Xin Zhang, Di Zhang, Sheng Chai, Bin Xing, Jie Zhang, Xiaoling Yu, Yu Zhou e Haixia Zheng. "Efficient and Secure Pairing Protocol for Devices with Unbalanced Computational Capabilities". Mathematics 10, n.º 14 (13 de julho de 2022): 2447. http://dx.doi.org/10.3390/math10142447.
Texto completo da fonteGopalakrishnan, Prakash, e B. Uma Maheswari. "Keyless Cryptosystem for Secure Primitive Pairing of Mobile Devices". Journal of Computational and Theoretical Nanoscience 15, n.º 5 (1 de maio de 2018): 1607–14. http://dx.doi.org/10.1166/jctn.2018.7349.
Texto completo da fonteSenthil Kumar, T., e S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design". Measurement and Control 52, n.º 7-8 (17 de julho de 2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Texto completo da fonteGroza, Bogdan, Adriana Berdich, Camil Jichici e Rene Mayrhofer. "Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport". IEEE Access 8 (2020): 9246–59. http://dx.doi.org/10.1109/access.2020.2964151.
Texto completo da fonteCui, Weirong, Chenglie Du e Jinchao Chen. "PSP: proximity-based secure pairing of mobile devices using WiFi signals". Wireless Networks 25, n.º 2 (26 de setembro de 2017): 733–51. http://dx.doi.org/10.1007/s11276-017-1588-9.
Texto completo da fonteMayrhofer, R., e H. Gellersen. "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices". IEEE Transactions on Mobile Computing 8, n.º 6 (junho de 2009): 792–806. http://dx.doi.org/10.1109/tmc.2009.51.
Texto completo da fonteLiu, Dong, Jing Chen, Qisi Deng, Arouna Konate e Zairong Tian. "Secure pairing with wearable devices by using ambient sound and light". Wuhan University Journal of Natural Sciences 22, n.º 4 (15 de julho de 2017): 329–36. http://dx.doi.org/10.1007/s11859-017-1255-0.
Texto completo da fonteThumbur, Gowri, G. Srinivasa Rao, P. Vasudeva Reddy, N. B. Gayathri e D. V. Rama Koti Reddy. "Efficient Pairing-Free Certificateless Signature Scheme for Secure Communication in Resource-Constrained Devices". IEEE Communications Letters 24, n.º 8 (agosto de 2020): 1641–45. http://dx.doi.org/10.1109/lcomm.2020.2988818.
Texto completo da fonteJiang, Qi, Xiaohan Huang, Ning Zhang, Kuan Zhang, Xindi Ma e Jianfeng Ma. "Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices". IEEE Internet of Things Journal 6, n.º 3 (junho de 2019): 5618–30. http://dx.doi.org/10.1109/jiot.2019.2904177.
Texto completo da fonteWang, Guilin, Hua Shen, Liquan Chen, Jinguang Han e Ge Wu. "Mobile Sensoring Data Verification via a Pairing-Free Certificateless Signature Secure Approach against Novel Public Key Replacement Attacks". Electronics 12, n.º 23 (2 de dezembro de 2023): 4865. http://dx.doi.org/10.3390/electronics12234865.
Texto completo da fonteSilva-Trujillo, Alejandra Guadalupe, Mauricio Jacobo González González, Luis Pablo Rocha Pérez e Luis Javier García Villalba. "Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack". Sensors 23, n.º 12 (8 de junho de 2023): 5438. http://dx.doi.org/10.3390/s23125438.
Texto completo da fonteYan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang e Shuanggen Liu. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing". Electronics 13, n.º 3 (29 de janeiro de 2024): 534. http://dx.doi.org/10.3390/electronics13030534.
Texto completo da fonteUllah, Insaf, Abdullah Alomari, Noor Ul Amin, Muhammad Asghar Khan e Hizbullah Khattak. "An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things". Electronics 8, n.º 10 (16 de outubro de 2019): 1171. http://dx.doi.org/10.3390/electronics8101171.
Texto completo da fonteTsai, Jia-Lun, e Nai-Wei Lo. "Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings". Wireless Personal Communications 83, n.º 2 (28 de fevereiro de 2015): 1273–86. http://dx.doi.org/10.1007/s11277-015-2449-4.
Texto completo da fonteSun, Da-Zhi, e Li Sun. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications". Sensors 19, n.º 5 (7 de março de 2019): 1158. http://dx.doi.org/10.3390/s19051158.
Texto completo da fonteGuo, Rui, Qiaoyan Wen, Zhengping Jin e Hua Zhang. "An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks". Scientific World Journal 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/761240.
Texto completo da fonteKim, Hyunsung, e Sung Woon Lee. "Secure Energy Efficient Data Collection Scheme Over Wireless Multimedia Sensor Networks". Journal of Computational and Theoretical Nanoscience 13, n.º 10 (1 de outubro de 2016): 7375–84. http://dx.doi.org/10.1166/jctn.2016.5729.
Texto completo da fonteLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li e He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing". Sensors 20, n.º 17 (21 de agosto de 2020): 4720. http://dx.doi.org/10.3390/s20174720.
Texto completo da fonteYang, Lei, Yeh-Cheng Chen e Tsu-Yang Wu. "Provably Secure Client-Server Key Management Scheme in 5G Networks". Wireless Communications and Mobile Computing 2021 (22 de outubro de 2021): 1–14. http://dx.doi.org/10.1155/2021/4083199.
Texto completo da fonteKhan, Shahzad, Waseem Iqbal, Abdul Waheed, Gulzar Mehmood, Shawal Khan, Mahdi Zareei e Rajesh Roshan Biswal. "An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society". Sensors 22, n.º 1 (3 de janeiro de 2022): 336. http://dx.doi.org/10.3390/s22010336.
Texto completo da fonteYu, Binbin, e Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things". International Journal of Distributed Sensor Networks 15, n.º 9 (setembro de 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.
Texto completo da fonte