Journal cover image

Browse issues

Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2009 Vol. 4 No. 1/2

Special Issue on Secure Spontaneous Interaction

Guest Editors: Dr. René Mayrhofer, Dr. Kaisa Nyberg and Dr. Tim Kindberg


PagesTitle and authors
4-16Proximity-based authentication of mobile devices
Adin Scannell, Alexander Varshavsky, Anthony LaMarca, Eyal De Lara
DOI: 10.1504/IJSN.2009.023422

17-26Secure pairing of interface constrained devices
Claudio Soriente, Gene Tsudik, Ersin Uzun
DOI: 10.1504/IJSN.2009.023423

27-42Secure pairing with biometrics
Ileana Buhan, Bas Boom, Jeroen Doumen, Pieter H. Hartel, Raymond N.J. Veldhuis
DOI: 10.1504/IJSN.2009.023424

43-56Seeing-Is-Believing: using camera phones for human-verifiable authentication
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter
DOI: 10.1504/IJSN.2009.023425

57-68Using audio in secure device pairing
Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun
DOI: 10.1504/IJSN.2009.023426

69-86User-aided data authentication
Sven Laur, Sylvain Pasini
DOI: 10.1504/IJSN.2009.023427

87-100Standards for security associations in personal networks: a comparative analysis
J. Suomalainen, J. Valkonen, N. Asokan
DOI: 10.1504/IJSN.2009.023428

101-109Designing user studies for security applications: a case study with wireless network configuration
Cynthia Kuo, Adrian Perrig, Jesse Walker
DOI: 10.1504/IJSN.2009.023429

Additional Papers

110-124An evaluation of connection characteristics for separating network attacks
Robin Berthier, Michel Cukier
DOI: 10.1504/IJSN.2009.023430

125-134An efficient group key management scheme for mobile ad hoc networks
Bing Wu, Jie Wu, Yuhong Dong
DOI: 10.1504/IJSN.2009.023431