메뉴 건너뛰기




Volumn 4886 LNCS, Issue , 2007, Pages 307-324

Usability analysis of secure pairing methods

Author keywords

[No Author keywords available]

Indexed keywords

PROBLEM SOLVING; STANDARDIZATION; USER INTERFACES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 38549108892     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77366-5_29     Document Type: Conference Paper
Times cited : (62)

References (21)
  • 4
    • 38549162370 scopus 로고    scopus 로고
    • Wireless usb specification: Association models supplement, revision 1.0. USB Implementers Forum (2006), http://www.usb.org/developers/wusb/
    • Wireless usb specification: Association models supplement, revision 1.0. USB Implementers Forum (2006), http://www.usb.org/developers/wusb/
  • 9
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 2937 (2004)
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 2937
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 13
    • 38549142076 scopus 로고    scopus 로고
    • Framework for comparative usability of distributed applications
    • Technical Report NRC-TR-2007-005, Nokia Research Center
    • Kostiainen, K., Uzun, E., Asokan, N., Ginzboorg, P.: Framework for comparative usability of distributed applications. Technical Report NRC-TR-2007-005, Nokia Research Center (2007)
    • (2007)
    • Kostiainen, K.1    Uzun, E.2    Asokan, N.3    Ginzboorg, P.4
  • 14
    • 33646674674 scopus 로고    scopus 로고
    • Designing an evaluation method for security user interfaces: Lessons from studying secure wireless network configuration
    • Kuo, C., Perrig, A., Walker, J.: Designing an evaluation method for security user interfaces: Lessons from studying secure wireless network configuration. interactions 13(3), 28-31 (2006)
    • (2006) interactions , vol.13 , Issue.3 , pp. 28-31
    • Kuo, C.1    Perrig, A.2    Walker, J.3
  • 15
    • 84885941616 scopus 로고    scopus 로고
    • Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, 4301, pp. 90-107. Springer, Heidelberg (2006)
    • Laur, S., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90-107. Springer, Heidelberg (2006)
  • 16
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limtis on our capacity for processing information
    • Miller, G.A.: The magical number seven, plus or minus two: Some limtis on our capacity for processing information. Psycological Review 63, 81-97 (1956)
    • (1956) Psycological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 20
    • 38149097247 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Technical Report NRC-TR-2007-004, Nokia Research Center
    • Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. Technical Report NRC-TR-2007-004, Nokia Research Center (2007)
    • (2007)
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 21
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.