Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1572532.1572573acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
poster

Treat 'em like other devices: user authentication of multiple personal RFID tags

Published: 15 July 2009 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2022)Peripheral-Free Device Pairing by Randomly Switching PowerIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.312523119:6(4240-4254)Online publication date: 1-Nov-2022
  • (2020)Securely Connecting Wearables to Ambient Displays with User IntentIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.284097917:4(676-690)Online publication date: 1-Jul-2020
  • (2018)User-aided reader revocation in PKI-based RFID systemsJournal of Computer Security10.5555/2590708.259071319:6(1147-1172)Online publication date: 24-Dec-2018
  • Show More Cited By

Index Terms

  1. Treat 'em like other devices: user authentication of multiple personal RFID tags

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security
        July 2009
        205 pages
        ISBN:9781605587363
        DOI:10.1145/1572532

        Sponsors

        • Carnegie Mellon CyLab
        • Google Inc.

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 July 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Poster

        Conference

        SOUPS '09
        Sponsor:
        SOUPS '09: Symposium on Usable Privacy and Security
        July 15 - 17, 2009
        California, Mountain View, USA

        Acceptance Rates

        SOUPS '09 Paper Acceptance Rate 15 of 49 submissions, 31%;
        Overall Acceptance Rate 15 of 49 submissions, 31%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 26 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Peripheral-Free Device Pairing by Randomly Switching PowerIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.312523119:6(4240-4254)Online publication date: 1-Nov-2022
        • (2020)Securely Connecting Wearables to Ambient Displays with User IntentIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.284097917:4(676-690)Online publication date: 1-Jul-2020
        • (2018)User-aided reader revocation in PKI-based RFID systemsJournal of Computer Security10.5555/2590708.259071319:6(1147-1172)Online publication date: 24-Dec-2018
        • (2018)Can Jannie verify? Usability of display-equipped RFID tags for security purposesJournal of Computer Security10.5555/2590618.259062021:3(347-370)Online publication date: 24-Dec-2018
        • (2018)Acoustic Eavesdropping Attacks on Constrained Wireless Device PairingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2013.22477588:3(563-577)Online publication date: 25-Dec-2018
        • (2018)SYNCVIBE: Fast and Secure Device Pairing through Physical Vibration on Commodity Smartphones2018 IEEE 36th International Conference on Computer Design (ICCD)10.1109/ICCD.2018.00043(234-241)Online publication date: Oct-2018
        • (2016)Out-of-Band Covert Channels—A SurveyACM Computing Surveys10.1145/293837049:2(1-36)Online publication date: 30-Jun-2016
        • (2011)Usability of display-equipped RFID tags for security purposesProceedings of the 16th European conference on Research in computer security10.5555/2041225.2041257(434-451)Online publication date: 12-Sep-2011
        • (2011)Personalized cognitive passwords: an exploratory assessmentInformation Management & Computer Security10.1108/0968522111111584519:1(25-41)Online publication date: 22-Mar-2011
        • (2010)Readers behaving badlyProceedings of the 15th European conference on Research in computer security10.5555/1888881.1888884(19-36)Online publication date: 20-Sep-2010
        • Show More Cited By

        View Options

        Login options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media