2010
DOI: 10.1504/ijahuc.2010.033000
|View full text |Cite
|
Sign up to set email alerts
|

A visual way to talk to strangers: authentication in wireless pervasive computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…In this technique [10], a barcode displayed or printed on another device in the association is captured with built-in digital camera of mobile devices. The captured image is then used to compare the hashed public key.…”
Section: Barcode Representationmentioning
confidence: 99%
See 2 more Smart Citations
“…In this technique [10], a barcode displayed or printed on another device in the association is captured with built-in digital camera of mobile devices. The captured image is then used to compare the hashed public key.…”
Section: Barcode Representationmentioning
confidence: 99%
“…Although some of the them offer distinctive features for pervasive computing, they lack necessary factors to make them widely available: (1) well established technical standards (2) strong error checking mechanism for reliable code recognition (3) support for wide range of mobile platforms. In our earlier work [10], a 2D barcode called UniCode was developed. It has the capability of key verification described in Chapter 2, but UniCode also suffers from the weaknesses of all such sparsely used barcodes.…”
Section: Barcode For Pervasive Computingmentioning
confidence: 99%
See 1 more Smart Citation