Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Czerwinski, S., Zhao, B., Hodes, T., Joseph, A., Katz, R.: An Architecture for a Secure Service Discovery Service. In: Proc. fifth annual ACM/IEEE international conference on Mo-bile computing and networking, pp. 24–35 (1999)
2. Lecture Notes in Computer Science;F. Stajano,1999
3. Lecture Notes in Computer Science;L.E. Holmquist,2001
4. Feeney, L.M., Ahlgren, B., Westerlund, A.: Spontaneous Networking: An Application-oriented Approach to Ad Hoc Networking. IEEE Communications Magazine 39(6) (June 2001)
5. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium, San Diego, CA, USA, February 6-8 (2002)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations;2022 IEEE Conference on Communications and Network Security (CNS);2022-10-03
2. ivPair;Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2020-07-08
3. Usability classification for spontaneous device association;Personal and Ubiquitous Computing;2011-07-02
4. Pairing devices for social interactions;Proceedings of the SIGCHI Conference on Human Factors in Computing Systems;2011-05-07
5. How users associate wireless devices;Proceedings of the SIGCHI Conference on Human Factors in Computing Systems;2011-05-07