메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Usability and security of out-of-band channels in secure device pairing protocols

Author keywords

Pairing devices; Security protocols; Usability

Indexed keywords

COMMUNICATION CHANNEL; CRITICAL TASKS; KEY ELEMENTS; MOBILE PAYMENT; OUT-OF-BAND; PAIRING DEVICES; PAIRING METHOD; PERVASIVE COMPUTING; PUBLIC-KEY INFRASTRUCTURE; SECURE COMMUNICATIONS; SECURE DEVICE PAIRING; SECURITY PROTOCOLS; SHARED SECRETS; TRUSTED THIRD PARTIES; USABILITY; USABILITY AND SECURITY; USABILITY STUDIES; USER INTERFACE DESIGNS;

EID: 70350716576     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1572532.1572547     Document Type: Conference Paper
Times cited : (98)

References (34)
  • 2
    • 70350710428 scopus 로고    scopus 로고
    • D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, 2002.
    • D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, 2002.
  • 3
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? a field trial investigation
    • S. Brostoff and M. A. Sasse. Are passfaces more usable than passwords? a field trial investigation. In Proceedings of HCI 2000, 2000.
    • (2000) Proceedings of HCI 2000
    • Brostoff, S.1    Sasse, M.A.2
  • 5
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. Yao. On the security of public key protocols. In Information Theory, IEEE Transactions on, volume 29(2), pages 198-208, 1983.
    • (1983) Information Theory, IEEE Transactions on , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 7
    • 70350729076 scopus 로고    scopus 로고
    • C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. In RSA Cryptobytes, 7(1), pages 29-37. RSA Security, Spring 2004.
    • C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. In RSA Cryptobytes, volume 7(1), pages 29-37. RSA Security, Spring 2004.
  • 9
    • 70350716727 scopus 로고    scopus 로고
    • B. S. I. Group. Simple pairing white paper. www.bluetooth.com/NR/ rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing WP V10r00.pdf.
    • B. S. I. Group. Simple pairing white paper. www.bluetooth.com/NR/ rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing WP V10r00.pdf.
  • 12
    • 70350738741 scopus 로고    scopus 로고
    • S. Jeff. and E. Kindlund. How long should a task take? identifying specification limits for task times in usability tests. In In Proceeding of the Human Computer Interaction International Conference HCII 2005, Las Vegas, 2005.
    • S. Jeff. and E. Kindlund. How long should a task take? identifying specification limits for task times in usability tests. In In Proceeding of the Human Computer Interaction International Conference HCII 2005), Las Vegas, 2005.
  • 14
    • 14544269130 scopus 로고
    • Ibm computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use
    • J. R. Lewis. Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int. J. Hum.-Comput. Interact., 7(1):57-78, 1995.
    • (1995) Int. J. Hum.-Comput. Interact , vol.7 , Issue.1 , pp. 57-78
    • Lewis, J.R.1
  • 15
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • 8-11 May
    • J. McCune, A. Perrig, and M. Reiter. Seeing-is-believing: using camera phones for human-verifiable authentication. In Proc. IEEE Symposium on Security and Privacy, pages 110-124, 8-11 May 2005.
    • (2005) Proc. IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 16
    • 70350736361 scopus 로고    scopus 로고
    • A. Minke. Conducting repeated measures analyses: Experimental design considerations. Technical report, Annual Meeting of the Southwest Educational Research Association (Austin, TX, January 23-25, 1997), 1997.
    • A. Minke. Conducting repeated measures analyses: Experimental design considerations. Technical report, Annual Meeting of the Southwest Educational Research Association (Austin, TX, January 23-25, 1997), 1997.
  • 20
    • 0028409636 scopus 로고
    • Measuring usability: Preference vs. performance
    • April
    • J. Nielsen and J. Levy. Measuring usability: preference vs. performance. Commun. ACM, 37(4):66-75, April 1994.
    • (1994) Commun. ACM , vol.37 , Issue.4 , pp. 66-75
    • Nielsen, J.1    Levy, J.2
  • 23
    • 40149095729 scopus 로고    scopus 로고
    • Authenticating ad hoc networks by comparison of short digests
    • A. W. Roscoe and L. H. Nguyen. Authenticating ad hoc networks by comparison of short digests. Information and Computation, 206:250-271, 2008.
    • (2008) Information and Computation , vol.206 , pp. 250-271
    • Roscoe, A.W.1    Nguyen, L.H.2
  • 26
    • 9644296202 scopus 로고    scopus 로고
    • Biometrics: Truths and fictions
    • August 15
    • B. Schneier. Biometrics: Truths and fictions. Crypto-Gram Newsletter, August 15, 1998.
    • (1998) Crypto-Gram Newsletter
    • Schneier, B.1
  • 28
    • 0036999904 scopus 로고    scopus 로고
    • F. Stajano and R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. Computer, 35(4):22-26, Part Supplement,&pril 2002.
    • F. Stajano and R. Anderson. The resurrecting duckling: security issues for ubiquitous computing. Computer, 35(4):22-26, Part Supplement,&pril 2002.
  • 32
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • November
    • S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Lecture Notes in Computer Science, volume 3621, pages 309-326, November 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 33
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security in the real world
    • New York, NY, USA, ACM
    • D. Weirich and M. A. Sasse. Pretty good persuasion: a first step towards effective password security in the real world. In NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pages 137-143, New York, NY, USA, 2001. ACM.
    • (2001) NSPW '01: Proceedings of the 2001 workshop on New security paradigms , pp. 137-143
    • Weirich, D.1    Sasse, M.A.2
  • 34
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of pgp 5.0
    • August, Washington
    • A. Whitten and J. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th USENIX Security Symposium, August 1999, Washington, pages 169-183, 1999.
    • (1999) Proceedings of the 8th USENIX Security Symposium , pp. 169-183
    • Whitten, A.1    Tygar, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.