{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:21:17Z","timestamp":1742397677285},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540338949"},{"type":"electronic","value":"9783540338956"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11748625_13","type":"book-chapter","created":{"date-parts":[[2006,5,18]],"date-time":"2006-05-18T21:47:47Z","timestamp":1147988867000},"page":"202-219","source":"Crossref","is-referenced-by-count":13,"title":["LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust Establishment"],"prefix":"10.1007","author":[{"given":"Anthony J.","family":"Nicholson","sequence":"first","affiliation":[]},{"given":"Ian E.","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Hughes","sequence":"additional","affiliation":[]},{"given":"Brian D.","family":"Noble","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"CCITT, Draft Recommendation X.509: The Directory-Authentication Framework. Consultation Committee, International Telecommunications Union, Geneva (1989)"},{"key":"13_CR2","unstructured":"Freier, A., Karlton, P., Kocher, P.: Secure Socket Layer 3.0. Internet Draft (1996)"},{"key":"13_CR3","unstructured":"Warner, B.: Billions of \u201cphishing\u201d scam emails sent monthly. Reuters News Service (2004)"},{"key":"13_CR4","unstructured":"Bellovin, S.M.: Using the Domain Name System for system break-ins. In: Proceedings of the 5th USENIX Security Symposium (1995)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Xia, H., Brustoloni, J.C.: Hardening web browsers against man-in-the-middle and eavesdropping attacks. In: Proceedings of the 14th International World Wide Web Conference, WWW 2005 (2005)","DOI":"10.1145\/1060745.1060817"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. Neuman","year":"1994","unstructured":"Neuman, B., Ts\u2019o, T.: Kerberos: An authentication service for computer networks. IEEE Communications Magazine\u00a032, 33\u201338 (1994)","journal-title":"IEEE Communications Magazine"},{"key":"13_CR7","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: A usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium (1999)"},{"key":"13_CR8","unstructured":"Dohrmann, S., Ellison, C.: Public-key Support for Collaborative Groups. In: Proceedings of the First Annual PKI Research Workshop (2002)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Garfinkel, S., Margrave, D., Schiller, J., Nordlander, E., Miller, R.: How to make secure email easier to use. In: Proceedings of the Conference on Human Factors in Computing Systems, CHI (2005)","DOI":"10.1145\/1054972.1055069"},{"key":"13_CR10","unstructured":"Perrig, A., Song, D.: Hash Visualization: A New Technique to Improve Real-World Security. In: Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce, CryptEC (1999)"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/98.847919","volume":"7","author":"C. Peersman","year":"2000","unstructured":"Peersman, C., Cvetkovic, S.: The global system for mobile communications: Short Message Service. IEEE Personal Communications\u00a07, 15\u201323 (2000)","journal-title":"IEEE Personal Communications"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"6","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a06, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/3-540-48658-5_26","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"U.M. Maurer","year":"1994","unstructured":"Maurer, U.M.: Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 271\u2013281. Springer, Heidelberg (1994)"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., Oorschot, P., Wiener, M.: Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography\u00a02, 107\u2013125 (1992)","journal-title":"Designs, Codes, and Cryptography"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Kaminsky, M., Savvides, G., Mazieres, D., Kaashoek, M.: Decentralized User Authentication in a Global File System. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (2003)","DOI":"10.1145\/945445.945452"},{"key":"13_CR16","unstructured":"Burkholder, P.: SSL Man-in-the-middle Attacks. The SANS Institute (2002)"},{"key":"13_CR17","unstructured":"Xu, H., Teo, H., Wang, H.: Foundations of SMS Commerce Success: Lessions from SMS Messaging and Co-opetition. In: Proceedings of the 36th Hawaii International Conference on System Sciences, HICSS (2003)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Naor, M., Yung, M.: Universal one-way hash functions and their crytographic applications. In: Proceedings of the 21st ACM Symposium on the Theory of Computing, STOC 1989 (1989)","DOI":"10.1145\/73007.73011"},{"key":"13_CR19","unstructured":"National Institute of Standards and Technology (NIST): Secure Hash Standard (SHS). National Technical Information Service (2002)"},{"key":"13_CR20","unstructured":"Bluetooth SIG: Specification of the Bluetooth System (2005), http:\/\/www.bluetooth.org\/spec\/"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proceedings of the Third International Conference on Mobile Systems, Applications, and Services, MobiSys 2005 (2005)","DOI":"10.1145\/1067170.1067176"},{"key":"13_CR22","volume-title":"Security Engineering","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering. Wiley, Chichester (2001)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Nicholson, A.J., Han, J., Watson, D., Noble, B.D.: Exploiting Mobility for Key Establishment. In: Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2006 (2006)","DOI":"10.1109\/WMCSA.2006.9"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11428572_9","volume-title":"Pervasive Computing","author":"I. Smith","year":"2005","unstructured":"Smith, I., Consolvo, S., LaMarca, A., Hightower, J., Scott, J., Sohn, T., Hughes, J., Iachello, G., Abowd, G.D.: Social disclosure of place: From location technology to communication practices. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 134\u2013151. Springer, Heidelberg (2005)"},{"key":"13_CR25","unstructured":"Biggadike, A., Ferullo, D., Wilson, G., Perrig, A.: NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs. In: Proceedings of the SIGCOMM Asia Workshop (2005)"},{"key":"13_CR26","unstructured":"Ford, B., Srisuresh, P., Kegel, D.: Peer-to-Peer Communication Across Network Address Translators. In: Proceedings of the USENIX Annual Technical Conference (2005)"},{"key":"13_CR27","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael. NIST (2000)"},{"key":"13_CR28","unstructured":"Fischer, K.: Bluetooth Wireless Technology. In: Proceedings of the IEEE EMC Wireless Workshop (2000)"},{"key":"13_CR29","unstructured":"Thompson, K.: A Security Review of the ASB Bank Netcode Authentication System (2004), http:\/\/www.crypt.gen.nz\/papers\/asb_netcode.html"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Claessens, J., Preneel, B., Vandewalle, J.: Combining World Wide Web and Wireless Security. In: Proceedings of IFIP Network Security (2001)","DOI":"10.1007\/0-306-46958-8_11"},{"key":"13_CR31","unstructured":"Maher, D.: Secure communication method and apparatus. U.S. Patent Number 5,450,493 (1995)"},{"key":"13_CR32","unstructured":"Gehrmann, C., Mitchell, C., Nyberg, K.: Manual Authentication for Wireless Devices. RSA Cryptobytes 7 (2004)"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Hoepman, J.H.: The Ephemeral Pairing Problem. In: Proceedings of the 8th International Conference on Financial Cryptography (2004)","DOI":"10.1007\/978-3-540-27809-2_22"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Madhavapeddy, A., Sharp, R., Scott, D., Tse, A.: Audio Networking: The Forgotten Wireless Technology. IEEE Pervasive Computing 4 (2005)","DOI":"10.1109\/MPRV.2005.50"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling. In: Proceedings of the 7th International Workshop on Security Protocols (1999)","DOI":"10.1007\/10720107_25"},{"key":"13_CR36","unstructured":"Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2002), San Diego, California, USA (2002)"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Security in Ad Hoc Networks. In: Proceedings of the Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2003), Annapolis, Maryland, USA (2003)","DOI":"10.1145\/778415.778422"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11748625_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:56:11Z","timestamp":1619492171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11748625_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540338949","9783540338956"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/11748625_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}