2009
DOI: 10.1504/ijsn.2009.023425
|View full text |Cite
|
Sign up to set email alerts
|

Seeing-Is-Believing: using camera phones for human-verifiable authentication

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
113
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 111 publications
(114 citation statements)
references
References 24 publications
1
113
0
Order By: Relevance
“…Wireless communication is no ideal choice because it is difficult to ensure that the response actually comes from the intended camera. Therefore, we rely on an approach similar to secure device pairing techniques proposed for mobile phones [26]. An in-depth discussion of our system, including the involved protocols, is provided in Sect.…”
Section: Design Of a Direct User Feedback Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Wireless communication is no ideal choice because it is difficult to ensure that the response actually comes from the intended camera. Therefore, we rely on an approach similar to secure device pairing techniques proposed for mobile phones [26]. An in-depth discussion of our system, including the involved protocols, is provided in Sect.…”
Section: Design Of a Direct User Feedback Systemmentioning
confidence: 99%
“…With Seeing-Is-Believing (SIB) [26], McCune et al take a different approach using visual communication to establish an authentic communication channel between mobile phones. Visual communication has the advantages that it is intuitive for users and that attacks on the communication are easily spotted.…”
Section: Related Work On User-based Attestationmentioning
confidence: 99%
“…In a first combination with the TCG architecture, [25] demonstrate a mobile phone application which uses 2-D barcodes on stickers to identify a public key of devices like printers or IEEE 802.11 access points. The authors also consider integration in TPM-based attestation protocols.…”
Section: Related Workmentioning
confidence: 99%
“…We illustrate a successful attestation similar to when carried out with the scheme that has been demonstrated by [14,25]. Note that the individual kiosks are identified by barcode tags attached to them.…”
mentioning
confidence: 94%
“…Seeing-is-Believing methods use a public-key encoded as a 2D-barcode to set up the key (McCune et al 2005). Unlike the Talking-to-Strangers protocol, Seeing-is-Believing requires only a single specialized set-up hardware equipped with a camera or barcode reader.…”
Section: Related Work On Secure Key Deployment For Sensor Nodesmentioning
confidence: 99%