Proximity-based authentication of mobile devices



FREE-DOWNLOAD A Scannell, A Varshavsky, A LaMarca… – International Journal of …, 2009
. The key advantages of our technique are that it does not require any additional hardware  . on the
devices beyond the radios that are already used for communication, it does  . Keywords:
proximity-based authentication; security; secure pairing; radio authentication; mobile devices.