
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Ford Long Wong, Frank Stajano, "Multichannel Security Protocols," IEEE Pervasive Computing, vol. 6, no. 4, pp. 3139, OctoberDecember, 2007.  
BibTex  x  
@article{ 10.1109/MPRV.2007.76, author = {Ford Long Wong and Frank Stajano}, title = {Multichannel Security Protocols}, journal ={IEEE Pervasive Computing}, volume = {6}, number = {4}, issn = {15361268}, year = {2007}, pages = {3139}, doi = {http://doi.ieeecomputersociety.org/10.1109/MPRV.2007.76}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  MGZN JO  IEEE Pervasive Computing TI  Multichannel Security Protocols IS  4 SN  15361268 SP31 EP39 EPD  3139 A1  Ford Long Wong, A1  Frank Stajano, PY  2007 KW  security protocols KW  key agreement KW  channels KW  authentication KW  commitment VL  6 JA  IEEE Pervasive Computing ER   
1. F. Stajano and R. Anderson, "The Resurrecting Duckling—Security Issues for Ad Hoc Wireless Networks," Proc. Security Protocols Workshop, LNCS 1796, Springer, 1999, pp. 172–182.
2. F.L. Wong and F. Stajano, "MultiChannel Protocols," Proc. 13th Int'l Workshop Security Protocols, LNCS 4631, Springer, 2005.
3. M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Comm. ACM, vol. 36, no. 3, 1993, pp. 75–84.
4. W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, 1976, pp. 644–654.
5. D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198–208.
6. S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. 5th Int'l Conf. Cryptology and Network Security (CANS 06), LNCS 4301, Springer, 2006, pp. 90–107.
1. D. Balfanz et al., "Talking to Strangers: Authentication in Ad Hoc Wireless Networks," Proc. Network and Distributed System Security Symp., Internet Soc., 2002.
2. J.H. Hoepman, "The Ephemeral Pairing Problem," Proc. Financial Cryptography, LNCS 3110, Springer, 2004, pp. 212–226.
3. J.M. McCune, A. Perrig, and M.K. Reiter, Seeing Is Believing: Using Camera Phones for HumanVerifiable Authentication, tech. report CMUCS04174, Computer Science Dept., Carnegie Mellon Univ., 2004.
4. S. Vaudenay, "Secure Communications over Insecure Channels Based on Short Authenticated Strings," Proc. 25th Ann. Int'l Cryptology Conf. (CRYPTO 05), LNCS 3621, Springer, 2005, pp. 309–326.
5. M. Cagalj, S. Capkun, and J.P. Hubaux, "Key Agreement in PeertoPeer Wireless Networks," Proc. IEEE, vol. 94, no. 2, 2006, pp. 467–478.
6. S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. 5th Int'l Conf. Cryptology and Network Security (CANS 06), LNCS 4301, Springer, 2006, pp. 90–107.
7. L.E. Holmquist et al., "SmartIts Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," Proc. 3rd Int'l Conf. Ubiquitous Computing (Ubicomp 01), LNCS 2201, Springer, 2001, pp. 116–122.
8. U. Maurer and P. Schmid, "A Calculus for Secure Channel Establishment in Open Networks," Proc. 3rd European Symp. Research in Computer Security (ESORICS94), LNCS 875, Springer, 1994, pp. 173–192.
9. S. Creese et al., "The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model," Proc. 1st Int'l Workshop Formal Aspects in Security and Trust (FAST 03), tech. report, Inst. of Informatics and Telematics—Italian Nat'l Research Council, 2003, pp. 83−97.
1. W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, 1976, pp. 644–654.
2. M. Steiner, G. Tsudik, and M. Waidner, "Cliques: A New Approach to Group Key Agreement," Proc. 18th Int'l Conf. Distributed Computing Systems (ICDCS 98), IEEE CS Press, 1998, pp. 380–387.
3. O. Pereira and J.J. Quisquater, "Generic Insecurity of CliquesType Authenticated Group Key Agreement Protocols," Proc. IEEE Computer Security Foundations Workshop (CSFW 17), IEEE CS Press, 2004, pp. 16–29.
4. D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198–208.
5. F.L. Wong and F. Stajano, "MultiChannel Protocols for Group Key Agreement in Arbitrary Topologies," Proc. 3rd IEEE Int'l Workshop Pervasive Computing and Communication Security (PerSec 06), IEEE Press, 2006.
6. L.H. Nguyen and A.W. Roscoe, "Efficient Group Authentication Protocols Based on Human Interaction," Proc. FCSARSPA, 2006, pp. 9–32.
7. J. Valkonen, N. Asokan, and K. Nyberg, "Ad Hoc Security Associations for Groups," Proc. 3rd European Workshop Security in Ad Hoc and Sensor Networks (ESAS 06), LNCS 4357, Springer, 2006, pp. 150–164.