Добірка наукової літератури з теми "Secure device pairing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure device pairing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure device pairing"
Mirzadeh, Shahab, Haitham Cruickshank, and Rahim Tafazolli. "Secure Device Pairing: A Survey." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 17–40. http://dx.doi.org/10.1109/surv.2013.111413.00196.
Повний текст джерелаAnnadurai, Soorya, and Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Повний текст джерелаMalkani, Yasir Arfat. "Secure Device Pairing: A Usability Study." International Journal of UbiComp 3, no. 2 (April 30, 2012): 31–46. http://dx.doi.org/10.5121/iju.2012.3203.
Повний текст джерелаGoodrich, Michael T., Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, and Ersin Uzun. "Using audio in secure device pairing." International Journal of Security and Networks 4, no. 1/2 (2009): 57. http://dx.doi.org/10.1504/ijsn.2009.023426.
Повний текст джерелаGuo, Zhenge, Xueguang Gao, Qiang Ma, and Jizhong Zhao. "Secure device pairing via handshake detection." Tsinghua Science and Technology 23, no. 5 (October 2018): 621–33. http://dx.doi.org/10.26599/tst.2018.9010085.
Повний текст джерелаFomichev, Mikhail, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, and Matthias Hollick. "Survey and Systematization of Secure Device Pairing." IEEE Communications Surveys & Tutorials 20, no. 1 (2018): 517–50. http://dx.doi.org/10.1109/comst.2017.2748278.
Повний текст джерелаKumar, Arun, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. "A comparative study of secure device pairing methods." Pervasive and Mobile Computing 5, no. 6 (December 2009): 734–49. http://dx.doi.org/10.1016/j.pmcj.2009.07.008.
Повний текст джерелаMalkani, Yasir Arfat, Moez Ahmed Malik, Lachhman Das Dhomeja, Bisharat Rasool Memon, and Abdul Waheed Mahesar. "A QR Code Based Group Pairing Approach for Mobile Ad Hoc Networks." Sukkur IBA Journal of Computing and Mathematical Sciences 5, no. 1 (April 27, 2021): 73–88. http://dx.doi.org/10.30537/sjcms.v5i1.806.
Повний текст джерелаShi, Congcong, Lei Xie, Chuyu Wang, Peicheng Yang, Yubo Song, and Sanglu Lu. "Just Shake Them Together: Imitation-Resistant Secure Pairing of Smart Devices via Shaking." Wireless Communications and Mobile Computing 2021 (April 2, 2021): 1–15. http://dx.doi.org/10.1155/2021/6668478.
Повний текст джерелаKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma, and Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey." Wireless Communications and Mobile Computing 2021 (January 28, 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Повний текст джерелаДисертації з теми "Secure device pairing"
Huser, Lukas. "Implementation and evaluation of a secure device pairing protocol." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institute of Information Security, 2009. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=451.
Повний текст джерелаKhalfaoui, Sameh. "Security bootstrapping for Internet of Things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT023.
Повний текст джерелаThe demand for internet of Things (IoT) services is increasing exponentially, and a large number of devices are being deployed. However, these devices can represent a serious threat to the security of the deployment network and a potential entry-point when exploited by the adversaries. Thus, there is an imminent need to perform a secure association approach of the IoT objects before being rendered operational on the network of the user. This procedure is referred to as secure bootstrapping, and it primarily guarantees the confidentiality and the integrity of the data exchanges between the user and the devices. Secondly, this process provides an assurance on the identity and the origin of these objects.Due to scalability limitations, the first phase of the bootstrapping process cannot be efficiently conducted using pre-shared security knowledge such as digital certificates. This step is referred to as secure device pairing, and it ensures the establishment of a secure communication channel between the use and the object. The pairing phase uses a symmetric key agreement protocol that is suitable to the resource-constrained nature of these devices. The use of auxiliary channels has been proposed as a way to authenticate the key exchange, but they require a relatively long time and an extensive user involvement to transfer the authentication bits. However, the context-based schemes use the ambient environment to extract a common secret without an extensive user intervention under the requirement of having a secure perimeter during the extraction phase, which is considered a strong security assumption. The second phase of the bootstrapping process is referred to as secure device enrollment, and it aims at avoiding the associating of a malicious IoT object by authenticating its identity. The use of hardware security elements, such as the Physical Unclonable Function (PUF), has been introduced as a promising solution that is suitable for the resource-constraint nature of these devices. A growing number of PUF architectures has been demonstrated mathematically clonable through Machine Learning (ML) modeling techniques. The use of PUF ML models has been recently proposed to authenticate the IoT objects. Nonetheless, the leakage scenario of the PUF model to an adversary due to an insider threat within the organization is not supported by the existing solutions. Hence, the security of these PUF model-based enrollment proposals can be compromised.In this thesis, we study the secure bootstrapping process of resource-constrained devices and we introduce two security schemes:- A hybrid ad-hoc pairing protocol, called COOB, that efficiently combines a state-of-the-art fast context-based scheme with the use of an auxiliary channel. This protocol exploits a nonce exponentiation of the Diffie-Hellman public keys to achieve the temporary secrecy goal needed for the key agreement. Our method provides security even against an attacker that can violate the safe zone requirement, which is not supported by the existing contextual schemes. This security improvement has been formally validated in the symbolic model using the TAMARIN prover.- An enrollment solution that exploits a ML PUF model in the authentication process, called Water-PUF. Our enrollment scheme is based on a specifically designed black-box watermarking technique for PUF models with a binary output response. This procedure prevents an adversary from relying on the watermarked model in question or another derivative model to bypass the authentication. Therefore, any leakage of the watermarked PUF model that is used for the enrollment does not affect the correctness of the protocol. The Water-PUF design is validated by a number of simulations against numerous watermark suppression attacks to assess the robustness of our proposal
Liu, Chunqiu. "INFRASTRUCTURE-FREE SECURE PAIRING OF MOBILE DEVICES." 2016. https://scholarworks.umass.edu/masters_theses_2/429.
Повний текст джерелаЧастини книг з теми "Secure device pairing"
Hsiao, Hsu-Chun. "Secure Device Pairing." In Encyclopedia of Wireless Networks, 1260–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_181.
Повний текст джерелаHsiao, Hsu-Chun. "Secure Device Pairing." In Encyclopedia of Wireless Networks, 1–4. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_181-1.
Повний текст джерелаLi, Ming, Wenjing Lou, and Kui Ren. "Secure Device Pairing." In Encyclopedia of Cryptography and Security, 1111–15. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_53.
Повний текст джерелаLi, Ming, and Wenjing Lou. "Secure Device Pairing." In Encyclopedia of Cryptography, Security and Privacy, 1–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_53-2.
Повний текст джерелаGuo, Zhenge, Zhaobin Liu, Jizhong Zhao, Hui He, and Meiya Dong. "Towards Secure Device Pairing via Vibration Detection." In Cloud Computing and Security, 177–86. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9_17.
Повний текст джерелаJiang, Zhiping, Rui Li, Kun Zhao, and Shuaiyu Chen. "Secure Device Pairing via Facial Image Similarity." In Cloud Computing and Security, 13–25. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9_2.
Повний текст джерелаChagnaadorj, Oyuntungalag, and Jiro Tanaka. "MimicGesture: Secure Device Pairing with Accelerometer-Based Gesture Input." In Lecture Notes in Electrical Engineering, 59–67. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5857-5_7.
Повний текст джерелаKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma, and Pascal Urien. "COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 419–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63095-9_27.
Повний текст джерелаAftab, Shoohira, Amna Khalid, Asad Raza, and Haider Abbas. "Secure SMS Based Automatic Device Pairing Approach for Mobile Phones." In Intelligent Computing Theories and Technology, 551–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39482-9_64.
Повний текст джерелаJavali, Chitra, Girish Revadigar, Lavy Libman, Ming Ding, Zihuai Lin, and Sanjay Jha. "Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks." In Physical Layer Security, 151–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55366-1_7.
Повний текст джерелаТези доповідей конференцій з теми "Secure device pairing"
Clay, William R., and Dongwan Shin. "Secure device pairing using audio." In 2009 International Carnahan Conference on Security Technology (ICCST). IEEE, 2009. http://dx.doi.org/10.1109/ccst.2009.5335562.
Повний текст джерелаNguyen, Trung, and Jean Leneutre. "Formal Analysis of Secure Device Pairing Protocols." In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). IEEE, 2014. http://dx.doi.org/10.1109/nca.2014.50.
Повний текст джерелаTrung Nguyen and Jean Leneutre. "A secure and effective device pairing protocol." In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2015. http://dx.doi.org/10.1109/ccnc.2015.7158026.
Повний текст джерелаSaxena, N., J. E. Ekberg, K. Kostiainen, and N. Asokan. "Secure device pairing based on a visual channel." In 2006 IEEE Symposium on Security and Privacy. IEEE, 2006. http://dx.doi.org/10.1109/sp.2006.35.
Повний текст джерелаSethi, Mohit, Aleksi Peltonen, and Tuomas Aura. "Misbinding Attacks on Secure Device Pairing and Bootstrapping." In Asia CCS '19: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3321705.3329813.
Повний текст джерелаKim, Eunah, Wonkeun Kong, and Jeong Hyun Yi. "Providing secure mobile device pairing based on visual confirmation." In 2009 IEEE 13th International Symposium on Consumer Electronics (ISCE). IEEE, 2009. http://dx.doi.org/10.1109/isce.2009.5157021.
Повний текст джерелаHe, Yaqi, Kai Zeng, Long Jiao, Brian L. Mark, and Khaled N. Khasawneh. "Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing." In WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3643833.3656127.
Повний текст джерелаGallego, Alexander, Nitesh Saxena, and Jonathan Voris. "Playful security: A computer game for secure wireless device pairing." In Serious Games (CGAMES). IEEE, 2011. http://dx.doi.org/10.1109/cgames.2011.6000336.
Повний текст джерелаKumar, Arun, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. "Caveat eptor: A comparative study of secure device pairing methods." In 2009 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 2009. http://dx.doi.org/10.1109/percom.2009.4912753.
Повний текст джерелаMalkani, Yasir Arfat, Dan Chalmers, and Ian Wakeman. "A framework for secure device pairing by demonstration of physical proximity." In the 8th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1943628.1943649.
Повний текст джерела