-
1
-
-
85084163516
-
Network-in-a-Box: How to set up a secure wireless network in under a minute
-
D. Balfanz, G. Durfee, R. Grinter, D. Smetters, and P. Stewart. Network-in-a-Box: how to set up a secure wireless network in under a minute. In USENIX Security, pages 207-222, 2004.
-
(2004)
USENIX Security
, pp. 207-222
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.3
Smetters, D.4
Stewart, P.5
-
5
-
-
0002020833
-
SUS: A "quick and dirty" usability scale
-
P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Taylor and Francis, London
-
J. Brooke. SUS: a "quick and dirty" usability scale. In P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, London, 1996.
-
(1996)
Usability Evaluation in Industry
-
-
Brooke, J.1
-
6
-
-
0003519438
-
-
Lawrence Erlbaum Associates, Hillsdale, NJ
-
J. Cohen, P. Cohen, S. G. West, and L. S. Aiken. Applied multiple regression/correlation analysis for the behavioral sciences. Lawrence Erlbaum Associates, Hillsdale, NJ, 1983.
-
(1983)
Applied multiple regression/correlation analysis for the behavioral sciences
-
-
Cohen, J.1
Cohen, P.2
West, S.G.3
Aiken, L.S.4
-
8
-
-
0033706465
-
Measuring usability: Are effectiveness, efficiency, and satisfaction really correlated?
-
E. Frøkjr, M. Hertzum, and K. Hornbæk. Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? In CHI '00: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 345-352, 2000.
-
(2000)
CHI '00: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 345-352
-
-
Frøkjr, E.1
Hertzum, M.2
Hornbæk, K.3
-
9
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. RSA CryptoBytes, 7(1):29-37, 2004.
-
(2004)
RSA CryptoBytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
11
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 10, 2006.
-
(2006)
ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
13
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
London, UK, Springer-Verlag
-
L. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Ubiquitous Computing (UbiComp), pages 116-122, London, UK, 2001. Springer-Verlag.
-
(2001)
Ubiquitous Computing (UbiComp)
, pp. 116-122
-
-
Holmquist, L.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.6
-
14
-
-
70350716576
-
Usability and security of out-of-band channels in secure device pairing protocols
-
Mountain View, CA
-
R. Kainda, I. Flechais, and A. W. Roscoe. Usability and security of out-of-band channels in secure device pairing protocols. In 2009 Symposium On Usable Privacy and Security (SOUPS), Mountain View, CA (this volume), 2009.
-
(2009)
2009 Symposium On Usable Privacy and Security (SOUPS)
, vol.this volume
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.W.3
-
15
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In Information Security Conference (ISC), pages 44-53, 2003.
-
(2003)
Information Security Conference (ISC)
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
16
-
-
70350731535
-
-
Personal Communication, Mar
-
K. Kostiainen. Personal Communication, Mar 2008.
-
(2008)
-
-
Kostiainen, K.1
-
19
-
-
84885941616
-
-
S. Laur and K. Nyberg. E cient mutual data authentication using manually authenticated strings. In International Conference on Cryptology and Network Security (CANS), 4301, pages 90{107, 2006.
-
S. Laur and K. Nyberg. E cient mutual data authentication using manually authenticated strings. In International Conference on Cryptology and Network Security (CANS), volume 4301, pages 90{107, 2006.
-
-
-
-
23
-
-
70350726915
-
-
Personal Communication, Mar
-
J. M. McCune. Personal Communication, Mar 2008.
-
(2008)
-
-
McCune, J.M.1
-
27
-
-
33751023773
-
Secure device pairing based on a visual channel
-
N. Saxena, J. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In 2006 IEEE Symposium on Security and Privacy, pages 306-313, 2006.
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.2
Kostiainen, K.3
Asokan, N.4
-
30
-
-
56649100493
-
HAPADEP: Human-assisted pure audio device pairing
-
C. Soriente, G. Tsudik, and E. Uzun. HAPADEP: human-assisted pure audio device pairing. In Information Security, pages 385-400, 2008.
-
(2008)
Information Security
, pp. 385-400
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
31
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
32
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors
-
J. Suomalainen, J. Valkonen, and N. Asokan. Security associations in personal networks: A comparative analysis. In F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS), pages 43-57, 2007.
-
(2007)
Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS)
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
34
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Advances in Cryptology-CRYPTO, pages 309-326, 2005.
-
(2005)
Advances in Cryptology-CRYPTO
, pp. 309-326
-
-
Vaudenay, S.1
|