On the Privacy of Peer-Assisted Distribution of Security Patches. [Citation Graph (, )][DBLP]
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. [Citation Graph (, )][DBLP]
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. [Citation Graph (, )][DBLP]
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. [Citation Graph (, )][DBLP]
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison. [Citation Graph (, )][DBLP]
Universal device pairing using an auxiliary device. [Citation Graph (, )][DBLP]
Treat 'em like other devices: user authentication of multiple personal RFID tags. [Citation Graph (, )][DBLP]
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes [Citation Graph (, )][DBLP]
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population [Citation Graph (, )][DBLP]
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009) [Citation Graph (, )][DBLP]
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting [Citation Graph (, )][DBLP]
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing [Citation Graph (, )][DBLP]
Search in 0.041secs, Finished in 0.042secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP