Research Journal of Applied Sciences

Year: 2014
Volume: 9
Issue: 8
Page No. 503 - 510

A Novel Visual Image Confirmation (VIC) Protocol Using Visual Cryptography for Securing Ubiquitous Bluetooth Mobile Communications

Authors : A. John Blesswin and P. Visalakshi

References

Bluetooth, SIG., 2006. Simple pairing whitepaper. Technical Report, Bluetooth, Special Interest Group, 3 August, 2006, pp: 3-23. http://mclean-linsky.net/joel/cv/Simple%20Pairing_WP_V10r00.pdf.

Blundo, C., A. de Santis and M. Naor, 2000. Visual cryptography for grey level images. Inform. Process. Lett., 75: 255-259.
CrossRef  |  Direct Link  |  

Chang, C.C., C.C. Lin, T.H.N. Le and H.B. Le, 2009. Self-verifying visual secret sharing using error diffusion and interpolation techniques. IEEE Trans. Inform. Forensics Secur., 4: 790-801.
CrossRef  |  

Chen, J.J. and C. Adams, 2004. Short-range wireless technologies with mobile payments systems. Proceedings of the 6th International Conference on Electronic Commerce, October 25-27, 2004, The Netherlands, pp: 649-656.

Ciptasari, R.W., K.H. Rhee and K. Sakurai, 2014. An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J. Inform. Secur.,. 10.1186/1687-417X-2014-2

Floyd, R.W., 1976. An adaptive algorithm for spatial gray-scale. Proc. Soc. Inf. Dis., 17: 75-77.
Direct Link  |  

Gehrmann, C., J. Persson and B. Smeets, 2004. Bluetooth Security. Artech House, Norwood, MA., ISBN-10: 1580535046.

Li, C.T., M.S. Hwang and Y.P. Chu, 2008. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun., 31: 2803-2814.
CrossRef  |  Direct Link  |  

Miklos, G., A. Racz, Z. Turanyi, A. Valko and P. Johansson, 2000. Performance aspects of Bluetooth scatternet formation. Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, August 11-11, 2000, Boston, MA., USA., pp: 147-148.

Naor, M. and A. Shamir, 1994. Visual cryptography. Adv. Cryptol., 950: 1-12.

SIG, 2002. BluetoothTM security white paper. Special Interest Group (SIG), 19 April, 2002, pp: 1-46. http://up.backtrack.cz/data/ebooks/BlueTooth/bluetooth-security-sig.pdf.

Salonidis, T., P. Bhagwat, L. Tassiulas and R. LaMaire, 2001. Distributed topology construction of Bluetooth personal area networks. Proceedings, IEEE INFOCOM 2001, 20th Annual Joint Conference of the IEEE Computer and Communications Societies, Volume 3, April 22-26, 2001, Anchorage, AK., pp: 1577-1586.

Salonidis, T., P. Bhagwat, L. Tassiulas and R. LaMaire, 2005. Distributed topology construction of Bluetooth wireless personal area networks. IEEE J. Selected Areas Commun., 23: 633-643.
CrossRef  |  

Wang, Z., G.R. Arce and G. Di Crescenzo, 2009. Halftone visual cryptography via error diffusion. IEEE Trans. Inform. Forensics Secur., 4: 383-396.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved