Abstract | ||
---|---|---|
In recent years, researchers have proposed several secure device pairing schemes that allow mobile devices in close proximity to establish a trusted communication channel between them without sharing any secret in advance. These schemes use the correlation of some physical measurements (magnetic field, acceleration, etc.,) made independently by the two pairing devices to reconcile them. Their secu... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TIFS.2017.2766048 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Protocols,Authentication,Cryptography,Correlation,Communication system security,Wireless communication | Authentication,Wireless,Man-in-the-middle attack,Interlock protocol,Computer security,Computer science,Cryptography,Communication channel,Computer network,Pairing,Interlock | Journal |
Volume | Issue | ISSN |
13 | 3 | 1556-6013 |
Citations | PageRank | References |
1 | 0.36 | 40 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yongdong Wu | 1 | 356 | 43.05 |
Binbin Chen | 2 | 240 | 31.18 |
Zhigang Zhao | 3 | 10 | 4.98 |
Yao Cheng | 4 | 36 | 6.21 |