Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence
The physical environment is becoming more and more saturated with computing and
communication entities that interact among themselves, as well as with users: virtually …
communication entities that interact among themselves, as well as with users: virtually …
Key generation for internet of things: A contemporary survey
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …
of Things devices that have no prior knowledge between each other. In the past few years, a …
Smile: Encounter-based trust for mobile social services
Conventional mobile social services such as Loopt and Google Latitude rely on two classes
of trusted relationships: participants trust a centralized server to manage their location …
of trusted relationships: participants trust a centralized server to manage their location …
Secure ad hoc trust initialization and key management in wireless body area networks
The body area network (BAN) is a key enabling technology in e-healthcare. An important
security issue is to establish initial trust relationships among the BAN devices before they …
security issue is to establish initial trust relationships among the BAN devices before they …
Social trust in opportunistic networks
S Trifunovic, F Legendre… - 2010 INFOCOM IEEE …, 2010 - ieeexplore.ieee.org
Opportunistic networks enable mobile users to participate in various social interactions with
applications such as content distribution and micro-blogs. Because of their distributed …
applications such as content distribution and micro-blogs. Because of their distributed …
Group device pairing based secure sensor association and key management for body area networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote
health monitoring. An important security issue during bootstrap phase of the BAN is to …
health monitoring. An important security issue during bootstrap phase of the BAN is to …
Sounds Good? Fast and Secure Contact Exchange in Groups
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …
current approaches lack usability and scalability for larger groups of users. We evaluate the …
A survey of user interaction for spontaneous device association
In a wireless world, users can establish ad hoc virtual connections between devices that are
unhampered by cables. This process is known as spontaneous device association. A wide …
unhampered by cables. This process is known as spontaneous device association. A wide …
Keylogging-resistant visual authentication protocols
The design of secure authentication protocols is quite challenging, considering that various
kinds of root kits reside in Personal Computers (PCs) to observe user's behavior and to …
kinds of root kits reside in Personal Computers (PCs) to observe user's behavior and to …
Towards a theory of trust in networks of humans and computers
V Gligor, JM Wing - Security Protocols XIX: 19th International Workshop …, 2011 - Springer
We argue that a general theory of trust in networks of humans and computers must be build
on both a theory of behavioral trust and a theory of computational trust. This argument is …
on both a theory of behavioral trust and a theory of computational trust. This argument is …