W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet of Things devices that have no prior knowledge between each other. In the past few years, a …
To communicate efficiently with a prospective user, auditory interfaces are employed in mobile communication devices. Diverse sounds in different volumes are used to alert the …
M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to nearby smartphones via covert magnetic signals. The proposed covert channel works even …
Gait has been proposed as a feature for mobile device pairing across arbitrary positions on the human body. Results indicate that the correlation in gait-based features across different …
I Amerini, R Becarelli, R Caldelli… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Many everyday activities involve the exchange of confidential information through the use of a smartphone in mobility, ie, sending on e-mail, checking bank account, buying on-line …
Secure spontaneous authentication between devices worn at arbitrary locations on the same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …
Providing secure communications between wireless devices that encounter each other on an ad-hoc basis is a challenge that has not yet been fully addressed. In these cases, close …
R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel …
With the rapid growth of wearable devices, more applications require direct communication between wearable devices. To secure the communication between wearable devices …