{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:41Z","timestamp":1725490241615},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540732747"},{"type":"electronic","value":"9783540732754"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73275-4_4","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T23:13:37Z","timestamp":1187824417000},"page":"43-57","source":"Crossref","is-referenced-by-count":21,"title":["Security Associations in Personal Networks: A Comparative Analysis"],"prefix":"10.1007","author":[{"given":"Jani","family":"Suomalainen","sequence":"first","affiliation":[]},{"given":"Jukka","family":"Valkonen","sequence":"additional","affiliation":[]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Balfanz, D. et al.: Talking to strangers: authentication in ad-hoc wireless networks. In: Proceedings of the Network and Distributed System Security Symposium (2002)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Barker, E. et al.: Recommendation for key management - part 1: General (revised), (2006), http:\/\/csrc.nist.gov\/CryptoToolkit\/kms\/SP800-57Part1_6-30-06.pdf","DOI":"10.6028\/NIST.SP.800-57p1r2006"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Steven, M. (ed.) Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions In Cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR5","unstructured":"Gehrmann, C. et al.: Manual authentication for wireless devices. RSA CryptoBytes (2004)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Kivinen, T., Kojo, M.: RFC3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) (May 2003), http:\/\/www.ietf.org\/rfc\/rfc3526.txt","DOI":"10.17487\/rfc3526"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Laur, S. et al.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. Cryptology ePrint Archive, Report 2005\/424 (2005)","DOI":"10.1007\/11935070_6"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Proceedings of the 5th International Conference on Cryptology and Network Security, pp. 90\u2013107 (2006)","DOI":"10.1007\/11935070_6"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Newman, R., et al.: Protecting domestic power-line communications. In: Proc. of The Second Symposium on Usable Privacy and Security, pp. 122\u2013132 (2006)","DOI":"10.1145\/1143120.1143136"},{"key":"4_CR10","unstructured":"NIST: National Institute of Standards and Technology. Digital Signature Standard (DSS). U.S. Department of Commerce (January 2000)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Pasini, S., Vaudenay, S.: SAS-based Authenticated Key Agreement. In: Proceedings of The 9th International Workshop on Theory and Practice in Public Key Cryptography, pp. 395\u2013409 (2006)","DOI":"10.1007\/11745853_26"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Saxena, N., et al.: Secure device pairing based on a visual channel (short paper). In: Proc. of the 2006 IEEE Symposium on Security and Privacy, pp. 306\u2013313 (2006)","DOI":"10.1109\/SP.2006.35"},{"key":"4_CR13","unstructured":"Simple Pairing Whitepaper. Bluetooth Special Interest Group (2006), http:\/\/www.bluetooth.com\/Bluetooth\/Apply\/Technology\/Research\/Simple_Pairing.htm"},{"key":"4_CR14","unstructured":"Suomalainen, J. et al.: Security associations in personal networks: A comparative analysis. Technical Report NRC-TR-2007-004, Nokia Research Center (2007), http:\/\/research.nokia.com\/tr\/NRC-TR-2007-004.pdf"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S. Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 309\u2013326. Springer, Heidelberg (2005)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"\u010cagalj, M., \u010capkun, S., Hubaux, J.-P.: Key agreement in peer-to-peer wireless networks. In: Proceedings of the IEEE (Special Issue on Cryptography and Security), pp. 467\u2013478 (2006)","DOI":"10.1109\/JPROC.2005.862475"},{"key":"4_CR17","unstructured":"Wi-Fi Alliance. Wi-Fi Protected Setup Specification. Wi-Fi Alliance Document (January 2007)"},{"key":"4_CR18","unstructured":"Wireless USB Specification. Association Models Supplement. Revision 1.0. USB Implementers Forum (2006), http:\/\/www.usb.org\/developers\/wusb\/"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Ad-hoc and Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73275-4_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:07:03Z","timestamp":1619503623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73275-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540732747","9783540732754"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73275-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}