Includes extended versions of papers from IWSSI 2007: the First International Workshop on Security for Spontaneous Interaction.
- Proximity-based authentication of mobile devices
- Secure pairing of interface constrained devices
- Secure pairing with biometrics
- Seeing-Is-Believing: using camera phones for human-verifiable authentication
- Using audio in secure device pairing
- User-aided data authentication
- Standards for security associations in personal networks: a comparative analysis
- Designing user studies for security applications: a case study with wireless network configuration
- An evaluation of connection characteristics for separating network attacks
- An efficient group key management scheme for mobile ad hoc networks
No comments:
Post a Comment