Proximity-based authentication of mobile devices
FREE-DOWNLOAD A Scannell, A Varshavsky, A LaMarca… – International Journal of …, 2009
. The key advantages of our technique are that it does not require any additional hardware . on the
devices beyond the radios that are already used for communication, it does . Keywords:
proximity-based authentication; security; secure pairing; radio authentication; mobile devices.