Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/1591
DC FieldValueLanguage
dc.contributor.authorGoodrich, Michael-
dc.contributor.authorSirivianos, Michael-
dc.contributor.authorSolis, John-
dc.contributor.authorSoriente, Claudio-
dc.contributor.authorTsudik, Gene-
dc.contributor.authorUzun, Ersin-
dc.date.accessioned2013-02-18T13:42:44Zen
dc.date.accessioned2013-05-17T05:22:20Z-
dc.date.accessioned2015-12-02T10:01:10Z-
dc.date.available2013-02-18T13:42:44Zen
dc.date.available2013-05-17T05:22:20Z-
dc.date.available2015-12-02T10:01:10Z-
dc.date.issued2009-
dc.identifier.citationInternational Journal of Security and Networks, 2009, vol. 4, no. 1-2, pp. 57-68en_US
dc.identifier.issn17478413-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/1591-
dc.description.abstractSecure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge. In this paper, we investigate the use of the audio channel for human-assisted device pairing. First we assume a common (insecure) wireless channel between devices. We then obviate the assumption of a pre-existing common channel with a single-channel device pairing approach only based on audio. Both approaches are applicable to a wide range of devices and place light burden on the useren_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.relation.ispartofInternational Journal of Security and Networksen_US
dc.rights© Inderscience Enterprisesen_US
dc.subjectAudioen_US
dc.subjectHuman-assisted authenticationen_US
dc.subjectMan-in-the-middle attacksen_US
dc.subjectMITMen_US
dc.subjectPersonal deviceen_US
dc.subjectSecure device pairingen_US
dc.titleUsing audio in secure device pairingen_US
dc.typeArticleen_US
dc.affiliationUniversity of Californiaen
dc.collaborationUniversity of Californiaen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.journalsSubscriptionen_US
dc.countryUnited Statesen_US
dc.subject.fieldNatural Sciencesen_US
dc.publicationPeer Revieweden_US
dc.identifier.doi10.1504/IJSN.2009.023426en_US
dc.dept.handle123456789/54en
dc.relation.issue1-2en_US
dc.relation.volume4en_US
cut.common.academicyear2008-2009en_US
dc.identifier.spage57en_US
dc.identifier.epage68en_US
item.grantfulltextnone-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypearticle-
item.fulltextNo Fulltext-
crisitem.journal.journalissn1747-8413-
crisitem.journal.publisherInderscience Enterprises-
crisitem.author.deptDepartment of Electrical Engineering, Computer Engineering and Informatics-
crisitem.author.facultyFaculty of Engineering and Technology-
crisitem.author.orcid0000-0002-6500-581X-
crisitem.author.parentorgFaculty of Engineering and Technology-
Appears in Collections:Άρθρα/Articles
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

34
checked on Nov 9, 2023

Page view(s)

508
Last Week
0
Last month
1
checked on Nov 6, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.