Blog
About

118
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Secure Communication in Disasters

      , , , ,

      The 26th BCS Conference on Human Computer Interaction (HCI)

      Human Computer Interaction

      12 - 14 September 2012

      Disaster, Spontaneous security, Human-Interactive Security Protocol

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This paper reports on the challenge of designing an application for bootstrapping secure communications in ad-hoc situations. The starting point of this work was based on prior work in “spontaneous security”: making use of Human-Interactive Security Protocols (HISPs) which exploit a human-based unspoofable channel to bootstrap secure comunications. Our approach was to develop a realistic scenario in which spontaneous and secure communications are necessary, and to use this to drive the development of the application.We settled on exploring how to provide secure communications in disasters: situations where existing communication and security infrastructures may be unavailable. Using the disaster scenario to guide development, we implemented a mobile application which allows users to create ad-hoc WiFi networks and bootstrap secure communications over these networks.

          Related collections

          Most cited references 3

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          GAnGS

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Authenticating ad hoc networks by comparison of short digests

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Reverse Authentication in Financial Transactions and Identity Management

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2012
                September 2012
                : 1-4
                Affiliations
                Department of Computer Science

                University of Oxford
                Article
                10.14236/ewic/HCI2012.63
                © Bangdao Chen et al. Published by BCS Learning and Development Ltd. The 26th BCS Conference on Human Computer Interaction, Birmingham, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                The 26th BCS Conference on Human Computer Interaction
                HCI
                26
                Birmingham, UK
                12 - 14 September 2012
                Electronic Workshops in Computing (eWiC)
                Human Computer Interaction
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article