scispace - formally typeset
Journal ArticleDOI

A comparative study of secure device pairing methods

Reads0
Chats0
TLDR
This work presents the first comprehensive comparative evaluation of notable secure device pairing methods, and identifies methods best-suited for a given combination of devices and human abilities.
About
This article is published in Pervasive and Mobile Computing.The article was published on 2009-12-01. It has received 124 citations till now. The article focuses on the topics: Secure channel & Usability.

read more

Citations
More filters
Journal ArticleDOI

BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network

TL;DR: This paper highlights the major security requirements in BSN-based modern healthcare system and proposes a secure IoT-based healthcare system using BSN, called B SN-Care, which can efficiently accomplish those requirements.
Journal ArticleDOI

Privacy in mobile technology for personal healthcare

TL;DR: This survey examines the privacy requirements of mobile computing technologies that have the potential to transform healthcare and develops a conceptual privacy framework for mHealth, itemize the privacy properties needed in mHealth systems, and discusses the technologies that could support privacy-sensitive m health systems.
Journal ArticleDOI

Secure ad hoc trust initialization and key management in wireless body area networks

TL;DR: This article proposes group device pairing (GDP), a user-aided multi-party authenticated key agreement protocol that supports fast batch deployment, addition and revocation of sensor devices, does not rely on any additional hardware device, and is mostly based on symmetric key cryptography.
Book

Usable Security: History, Themes, and Challenges

TL;DR: The historical context of the work to date on usable security and privacy is presented, a taxonomy for organizing that work is created, current research objectives are outlined, lessons learned are presented, and suggestions for future research are made.
Proceedings ArticleDOI

ZEBRA: Zero-Effort Bilateral Recurring Authentication

TL;DR: Zero-Effort Bilateral Recurring Authentication (ZEBRA) is proposed, a continuous authentication method based on behavioral biometric authentication that performs continuous authentication with 85% accuracy in verifying the correct user and identified all adversaries within 11s.
References
More filters
Book

Applied multiple regression/correlation analysis for the behavioral sciences

TL;DR: In this article, the Mathematical Basis for Multiple Regression/Correlation and Identification of the Inverse Matrix Elements is presented. But it does not address the problem of missing data.
Proceedings ArticleDOI

Why phishing works

TL;DR: This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users by analyzing a large set of captured phishing attacks and developing a set of hypotheses about why these strategies might work.
Book ChapterDOI

The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks

TL;DR: A resurrecting duckling security policy model is presented, which describes secure transient association of a device with multiple serialised owners over the air in a short range wireless channel.
Related Papers (5)