

Proximity-Based Authentication – The Future of Security for Mobile Devices
Abstract
Keywords
References
F. Bennett, T. Richardson, and A. Harter. Teleporting – Making Applications Mobile. In Proceedings of the IEEE Workshop on Mobile Computer Systems and Applications, pages82–84, Los Alamitos, CA, USA, 1994. IEEE CS Press.
Ward, A. Jones, and A. Hopper. A new location technique for the active office. IEEE Personal Communication Magazine, 4(5):42–47, October 1997.
B. Brumitt, B. Meyers, J. Krumm, A. Kern, and S. Shafer. EasyLiving: Technologies for Intelligent Environments. In P. Thomas and H.W. Gellersen, editors, Proceedings of Handheld and Ubiquitous Computing, HUC 2000, volume 1927 of Lecture Notes in Computer Science, pages 12–29, Bristol, UK, Sept. 2000. Springer Verlag.
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory, 644–654 (1976)
Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commun. ACM 27(4),393–394 (1984)
SWAP-CA. Shared Wireless Access Protocol (Cordless Access) Specification (SWAP-CA), Revision 1.0, The HomeRF Technical Committee (17 December 1998)
Shaked, Y., Wool, A.: Cracking the bluetooth pin. In: Proc. of Mobisys (2005)
Nicholson, A.J., Smith, I.E., Hughes, J., Noble, B.D.: Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. (2006)
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.:Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, Springer, Heidelberg (2001)
Near field communication (nfc), http://www.nfc-forum.org/resources/faqs
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.