Inproceedings,

On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.

, and .
ACM Conference on Computer and Communications Security, page 97-108. ACM, (2010)

Meta data

Tags

Users

  • @dblp

Comments and Reviews