|
[1] Phillips, P., Martin, A., Wilson, C., Przybocki, M.: An Introduction Evaluating Biometric Systems. Computer 33(2) (2000) 56–63 [2] XyLoc: Ensure technologies. http://www.ensuretech.com [3] Corner, M., Noble, B.: Zero-Interaction Authentication. In: Proceedings of the 8th annual international conference on Mobile computing and networking, ACM (2002) 1–11 [4] Abdelhameed, R., Khatun, S., Ali, B., Ramli, A.: Authentication Model Based Bluetooth-Enabled Mobile Phone. Journal of Computer Science 1(2) (2005) 199–202 [5] Abdelhameed, R., Khatun, S., Ali, B., Ramli, A.: Application of Cell-Phonein Laptop Security. Journal of Applied Sciences 5(2) (2005) 215–219 [6] Noble, B., Corner, M.: The Case for Transient Authentication. In: Proceedings of the 10th workshop on ACM SIGOPS European workshop, ACM (2002) 29 [7] Bauer, L., Garriss, S., McCune, J., Reiter, M., Rouse, J., Rutenbar, P.: Device- Enabled Authorization in the Grey System. Information Security 431–445 [8] Bauer, L., Cranor, L., Reeder, R., Reiter, M., Vaniea, K.: Comparing Access- Control Technologies: A Study of Keys and Smartphones. (2007) [9] Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Lessons Learned from the Deployment of a Smartphone-Based Access-Control System. In: SOUPS ’07: Proceedings of the 3rd Symposium on Usable Privacy and Security. (2007) 64– 75 [10] Beaufour, A., Bonnet, P.: Personal Servers as Digital Keys. In: Proc. 2nd IEEE International Conference of Pervasive Computing and Communications, Citeseer (2004) [11] Ravi, N., Stern, P., Desai, N., Iftode, L.: Accessing Ubiquitous Services Using Smart Phones. (2005) [12] McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. In: Proceedings of the IEEE Symposium on Security and Privacy. (2005) [13] Lin, Y.H., Studer, A., Hsiao, H.C., McCune, J.M., Wang, K.H., Krohn, M., Lin, P.L., Perrig, A., Sun, H.M., Yang, B.Y.: SPATE: Small-Group PKI-Less Authenticated Trust Establishment. In: MobiSys ’09: Proceedings of the 7th international conference on Mobile systems, applications, and services, New York, NY, USA, ACM (2009) 1–14 [14] Chen, C.H.O., Chen, C.W., Kuo, C., Lai, Y.H., McCune, J.M., Studer, A., Perrig, A., Yang, B.Y., Wu, T.C.: GAnGS: Gather Authenticate ’n Group Securely. In: Proceedings of the ACM Annual International Conference on Mobile Computing and Networking. (2008) [15] Kato, H., Tan, K.: Pervasive 2D Barcodes for Camera Phone Applications. IEEE Pervasive Computing (2007) 76–85 [16] Hsiao, H., Lin, Y., Studer, A., Studer, C., Wang, K., Kikuchi, H., Perrig, A., Sun, H., Yang, B.: A Study of User-Friendly Hash Comparison Schemes. In: Proceedings of the 2009 Annual Computer Security Applications Conference, IEEE Computer Society (2009) 105–114 [17] Glasbey, C., van der Heijden, G., Toh, V.F.K., Gray, A.: Colour Displays for Categorical Images. Color Research and Application 32(4) (2007) 304–309 [18] Studer, A., Perrig, A.: Mobile User Location-Specific Encryption (MULE): Using Your Office as Your Password. In: Proceedings of the third ACM conference on Wireless network security, ACM (2010) 151–162 [19] Kasten, O., Langheinrich, M.: First Experiences with Bluetooth in the Smart- Its Distributed Sensor Network. In: Workshop on Ubiquitous Computing and Communications, PACT. Volume 1., Citeseer (2001) [20] Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2) (1978) 126 [21] Brands, S., Chaum, D.: Distance-Bounding Protocols. In: Advances in CryptologyEUROCRYPT93, Springer (1993) 344–359 [22] Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on Computer and communications security, ACM (1993) 9–16 [23] Mircosoft Corporation: BitLocker Drive Encryption Overview. http:// technet.microsoft.com/en-us/library/cc732774.aspx [24] SecureStar: DriveCrypt: Disk Encryption and Data Encryption Software. http://www.securstar.com/products_drivecrypt.php
|