-
2
-
-
70350710428
-
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, 2002.
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, 2002.
-
-
-
-
3
-
-
0003429117
-
Are passfaces more usable than passwords? a field trial investigation
-
S. Brostoff and M. A. Sasse. Are passfaces more usable than passwords? a field trial investigation. In Proceedings of HCI 2000, 2000.
-
(2000)
Proceedings of HCI 2000
-
-
Brostoff, S.1
Sasse, M.A.2
-
5
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao. On the security of public key protocols. In Information Theory, IEEE Transactions on, volume 29(2), pages 198-208, 1983.
-
(1983)
Information Theory, IEEE Transactions on
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
7
-
-
70350729076
-
-
C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. In RSA Cryptobytes, 7(1), pages 29-37. RSA Security, Spring 2004.
-
C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. In RSA Cryptobytes, volume 7(1), pages 29-37. RSA Security, Spring 2004.
-
-
-
-
8
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
04-07 July
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In Proc. 26th IEEE International Conference on Distributed Computing Systems ICDCS 2006, pages 10-10, 04-07 July 2006.
-
(2006)
Proc. 26th IEEE International Conference on Distributed Computing Systems ICDCS
, pp. 10-10
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
9
-
-
70350716727
-
-
B. S. I. Group. Simple pairing white paper. www.bluetooth.com/NR/ rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing WP V10r00.pdf.
-
B. S. I. Group. Simple pairing white paper. www.bluetooth.com/NR/ rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing WP V10r00.pdf.
-
-
-
-
11
-
-
10444252457
-
Mobile phone vulnerabilities: A new generation of malware
-
Sept. 1-3
-
J. Jamaluddin, N. Zotou, and P. Coulton. Mobile phone vulnerabilities: a new generation of malware. Consumer Electronics, 2004 IEEE International Symposium on, pages 199-202, Sept. 1-3, 2004.
-
(2004)
Consumer Electronics, 2004 IEEE International Symposium on
, pp. 199-202
-
-
Jamaluddin, J.1
Zotou, N.2
Coulton, P.3
-
12
-
-
70350738741
-
-
S. Jeff. and E. Kindlund. How long should a task take? identifying specification limits for task times in usability tests. In In Proceeding of the Human Computer Interaction International Conference HCII 2005, Las Vegas, 2005.
-
S. Jeff. and E. Kindlund. How long should a task take? identifying specification limits for task times in usability tests. In In Proceeding of the Human Computer Interaction International Conference HCII 2005), Las Vegas, 2005.
-
-
-
-
14
-
-
14544269130
-
Ibm computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use
-
J. R. Lewis. Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int. J. Hum.-Comput. Interact., 7(1):57-78, 1995.
-
(1995)
Int. J. Hum.-Comput. Interact
, vol.7
, Issue.1
, pp. 57-78
-
-
Lewis, J.R.1
-
15
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
8-11 May
-
J. McCune, A. Perrig, and M. Reiter. Seeing-is-believing: using camera phones for human-verifiable authentication. In Proc. IEEE Symposium on Security and Privacy, pages 110-124, 8-11 May 2005.
-
(2005)
Proc. IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
16
-
-
70350736361
-
-
A. Minke. Conducting repeated measures analyses: Experimental design considerations. Technical report, Annual Meeting of the Southwest Educational Research Association (Austin, TX, January 23-25, 1997), 1997.
-
A. Minke. Conducting repeated measures analyses: Experimental design considerations. Technical report, Annual Meeting of the Southwest Educational Research Association (Austin, TX, January 23-25, 1997), 1997.
-
-
-
-
17
-
-
35348895703
-
Pictures at the atm: Exploring the usability of multiple graphical passwords
-
New York, NY, USA, ACM
-
W. Moncur and G. Lepl̂atre. Pictures at the atm: exploring the usability of multiple graphical passwords. In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 887-894, New York, NY, USA, 2007. ACM.
-
(2007)
CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 887-894
-
-
Moncur, W.1
Lepl̂atre, G.2
-
20
-
-
0028409636
-
Measuring usability: Preference vs. performance
-
April
-
J. Nielsen and J. Levy. Measuring usability: preference vs. performance. Commun. ACM, 37(4):66-75, April 1994.
-
(1994)
Commun. ACM
, vol.37
, Issue.4
, pp. 66-75
-
-
Nielsen, J.1
Levy, J.2
-
23
-
-
40149095729
-
Authenticating ad hoc networks by comparison of short digests
-
A. W. Roscoe and L. H. Nguyen. Authenticating ad hoc networks by comparison of short digests. Information and Computation, 206:250-271, 2008.
-
(2008)
Information and Computation
, vol.206
, pp. 250-271
-
-
Roscoe, A.W.1
Nguyen, L.H.2
-
24
-
-
80051471461
-
A method to standardize usability metrics into a single score
-
New York, NY, USA, ACM
-
J. Sauro and E. Kindlund. A method to standardize usability metrics into a single score. In CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 401-409, New York, NY, USA, 2005. ACM.
-
(2005)
CHI '05: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 401-409
-
-
Sauro, J.1
Kindlund, E.2
-
25
-
-
33751023773
-
Secure device pairing based on a visual channel (short paper)
-
Washington, DC, USA, IEEE Computer Society
-
N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel (short paper). In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 306-313, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
26
-
-
9644296202
-
Biometrics: Truths and fictions
-
August 15
-
B. Schneier. Biometrics: Truths and fictions. Crypto-Gram Newsletter, August 15, 1998.
-
(1998)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
28
-
-
0036999904
-
-
F. Stajano and R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. Computer, 35(4):22-26, Part Supplement,&pril 2002.
-
F. Stajano and R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. Computer, 35(4):22-26, Part Supplement,&pril 2002.
-
-
-
-
32
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
November
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Lecture Notes in Computer Science, volume 3621, pages 309-326, November 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
33
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security in the real world
-
New York, NY, USA, ACM
-
D. Weirich and M. A. Sasse. Pretty good persuasion: a first step towards effective password security in the real world. In NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pages 137-143, New York, NY, USA, 2001. ACM.
-
(2001)
NSPW '01: Proceedings of the 2001 workshop on New security paradigms
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.A.2
-
34
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of pgp 5.0
-
August, Washington
-
A. Whitten and J. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th USENIX Security Symposium, August 1999, Washington, pages 169-183, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-183
-
-
Whitten, A.1
Tygar, J.2
|