Back to Results
First PageMeta Content
Password / Cryptography / Cryptographic protocols / Usability / QR code / Bluetooth / Cryptographic hash function / Transport Layer Security / Mobile payment / Technology / Electronic commerce / Computing


Usability and Security of Out-Of-Band Channels in Secure Device Pairing Protocols Ronald Kainda Ivan Flechais
Add to Reading List

Document Date: 2009-06-18 19:45:58


Open Document

File Size: 374,95 KB

Share Result on Facebook

City

Country/ City / Mountain View / country/city / /

Company

User/Machine Systems / Nokia / W (CC or ds ) M ( el od CC ) N um Co / Microsoft / um Co / /

/

IndustryTerm

mobile computing / internal networks / online advertisement / analysis using statistical tools / authentication protocol / bank cards / secure systems / secure communications / e.g. devices / security protocol / ad hoc networks / secure protocol / mobile payment applications / similar protocols / infeasible given available technology / auxiliary device / mobile and pervasive computing / secure pairing protocols / security protocols / inversionresistant hash function devices / /

MusicGroup

Excel / Channels / /

NaturalFeature

Dolev-Yao channel / OOB channel / /

OperatingSystem

Symbian OS / /

Organization

High School / Russian army / Oxford University / /

Position

author / Human Factors General / /

Product

Nokia N95 Smartphone / Nokia N73 Smartphone / /

ProgrammingLanguage

Java / /

Technology

encryption / cellular telephone / authentication protocol / security protocol / Public Key Infrastructure / public key / Java / Peer-to-Peer / PKI / SHCBK protocol / mobile computing / P2P / decoding algorithm / mobile phones / Security Protocols / simulation / 2.1 Human-interactive security protocols / operating system / mobile device / 2.2 SHCBK protocol / SSL / Bluetooth / Bluetooth protocol / secure pairing protocols / SHCBK protocols / mobile devices / conducted using two mobile phones / /

SocialTag