Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence

M Conti, SK Das, C Bisdikian, M Kumar, LM Ni… - Pervasive and mobile …, 2012 - Elsevier
The physical environment is becoming more and more saturated with computing and
communication entities that interact among themselves, as well as with users: virtually …

Key generation for internet of things: A contemporary survey

W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …

Smile: Encounter-based trust for mobile social services

J Manweiler, R Scudellari, LP Cox - … of the 16th ACM conference on …, 2009 - dl.acm.org
Conventional mobile social services such as Loopt and Google Latitude rely on two classes
of trusted relationships: participants trust a centralized server to manage their location …

Secure ad hoc trust initialization and key management in wireless body area networks

M Li, S Yu, JD Guttman, W Lou, K Ren - ACM Transactions on sensor …, 2013 - dl.acm.org
The body area network (BAN) is a key enabling technology in e-healthcare. An important
security issue is to establish initial trust relationships among the BAN devices before they …

Social trust in opportunistic networks

S Trifunovic, F Legendre… - 2010 INFOCOM IEEE …, 2010 - ieeexplore.ieee.org
Opportunistic networks enable mobile users to participate in various social interactions with
applications such as content distribution and micro-blogs. Because of their distributed …

Group device pairing based secure sensor association and key management for body area networks

M Li, S Yu, W Lou, K Ren - 2010 Proceedings IEEE INFOCOM, 2010 - ieeexplore.ieee.org
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote
health monitoring. An important security issue during bootstrap phase of the BAN is to …

Sounds Good? Fast and Secure Contact Exchange in Groups

F Putz, S Haesler, M Hollick - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …

A survey of user interaction for spontaneous device association

MK Chong, R Mayrhofer, H Gellersen - ACM Computing Surveys (CSUR …, 2014 - dl.acm.org
In a wireless world, users can establish ad hoc virtual connections between devices that are
unhampered by cables. This process is known as spontaneous device association. A wide …

Keylogging-resistant visual authentication protocols

DH Nyang, A Mohaisen, J Kang - IEEE Transactions on Mobile …, 2014 - ieeexplore.ieee.org
The design of secure authentication protocols is quite challenging, considering that various
kinds of root kits reside in Personal Computers (PCs) to observe user's behavior and to …

Towards a theory of trust in networks of humans and computers

V Gligor, JM Wing - Security Protocols XIX: 19th International Workshop …, 2011 - Springer
We argue that a general theory of trust in networks of humans and computers must be build
on both a theory of behavioral trust and a theory of computational trust. This argument is …