Back to Results
First PageMeta Content
Cryptography / Password / One-time password / Authentication / IPAQ / S/KEY / Bluetooth / Security / Mobile computers / Technology


Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun Department of Computer Science University of California, Irvine {goodrich,ms
Add to Reading List

Document Date: 2006-06-28 12:55:55


Open Document

File Size: 181,57 KB

Share Result on Facebook

Company

The times / Sun / Intel / /

Country

United States / /

Currency

AED / /

Facility

Bouncy Castle / Computer Science University of California / /

IndustryTerm

wireless channel / participants/devices / security applications / nearby device / secure device / bank account / public key infrastructure / target devices / heterogeneous personal devices / similar devices / text recognition devices / user-attended device / un-attended target device / textbook protocols / exhaustive search / Wireless networks / un-associated devices / point-of-sale device / user-attended personal device / wireless access point / non-cryptographic software initialization / personal devices / public-key-based key exchange protocols / wireless subnet consisting / device / target device / heuristic algorithm / unassociated devices / bank / mobile computing platforms / hash algorithms / electronic devices / wireless device / wireless projector / device equipment / wireless links / pervasive global security infrastructure / wireless router / peer devices / wireless communication / remote device / /

NaturalFeature

IR channel / Infrared channel / /

OperatingSystem

Linux / Windows CE / Windows XP / Microsoft Windows / /

Organization

University of California / Irvine / Ersin Uzun Department / /

Person

Michael Sirivianos / Gene Tsudik / John Solis / Michael T. Goodrich / /

Position

Target Device Display Speaker / speaker / player / Personal Device Display Speaker / assistant / /

Product

Ewe / HP iPAQ Headphone/Headset / /

ProgrammingLanguage

Java / C++ / /

ProvinceOrState

California / /

Technology

heuristic algorithm / RAM / public key infrastructure / text-to-speech / key exchange protocol / Linux / API / PKI / Station-to-Station protocol / SmartPhone / Diffie-Hellman key exchange protocol / ATM / mobile phones / secret key / mobile devices / RSAbased key exchange protocols / Ethernet / cellular telephone / public key / wireless access / Java / RISC processor / wireless device / smartphones / mobile computing / textbook protocols / MD5 hash algorithms / one wireless router / Bluetooth / public-key-based key exchange protocols / GUI / Diffie-Hellman protocol / /

URL

www.elantts.com / www.digalo.com / http /

SocialTag