메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Serial hook-ups: A comparative usability study of secure device pairing methods

Author keywords

[No Author keywords available]

Indexed keywords

AUXILIARY CHANNEL; COMPARATIVE STUDIES; DEVICE CONFIGURATIONS; DEVICE PAIRING; PRIOR EXPERIENCE; SECURE COMMUNICATIONS; SECURE DEVICE PAIRING; SECURITY CONTEXT; SYSTEM USABILITY; TASK PERFORMANCE; TRUST INFRASTRUCTURE; USABILITY STUDIES; USER ASSISTANCE; WIRELESS CHANNEL; WIRELESS COMMUNICATIONS;

EID: 70350738597     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1572532.1572546     Document Type: Conference Paper
Times cited : (57)

References (34)
  • 1
    • 85084163516 scopus 로고    scopus 로고
    • Network-in-a-Box: How to set up a secure wireless network in under a minute
    • D. Balfanz, G. Durfee, R. Grinter, D. Smetters, and P. Stewart. Network-in-a-Box: how to set up a secure wireless network in under a minute. In USENIX Security, pages 207-222, 2004.
    • (2004) USENIX Security , pp. 207-222
    • Balfanz, D.1    Durfee, G.2    Grinter, R.3    Smetters, D.4    Stewart, P.5
  • 5
    • 0002020833 scopus 로고    scopus 로고
    • SUS: A "quick and dirty" usability scale
    • P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Taylor and Francis, London
    • J. Brooke. SUS: a "quick and dirty" usability scale. In P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, London, 1996.
    • (1996) Usability Evaluation in Industry
    • Brooke, J.1
  • 9
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. RSA CryptoBytes, 7(1):29-37, 2004.
    • (2004) RSA CryptoBytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 13
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • London, UK, Springer-Verlag
    • L. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Ubiquitous Computing (UbiComp), pages 116-122, London, UK, 2001. Springer-Verlag.
    • (2001) Ubiquitous Computing (UbiComp) , pp. 116-122
    • Holmquist, L.1    Mattern, F.2    Schiele, B.3    Alahuhta, P.4    Beigl, M.5    Gellersen, H.6
  • 14
    • 70350716576 scopus 로고    scopus 로고
    • Usability and security of out-of-band channels in secure device pairing protocols
    • Mountain View, CA
    • R. Kainda, I. Flechais, and A. W. Roscoe. Usability and security of out-of-band channels in secure device pairing protocols. In 2009 Symposium On Usable Privacy and Security (SOUPS), Mountain View, CA (this volume), 2009.
    • (2009) 2009 Symposium On Usable Privacy and Security (SOUPS) , vol.this volume
    • Kainda, R.1    Flechais, I.2    Roscoe, A.W.3
  • 15
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In Information Security Conference (ISC), pages 44-53, 2003.
    • (2003) Information Security Conference (ISC) , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 16
    • 70350731535 scopus 로고    scopus 로고
    • Personal Communication, Mar
    • K. Kostiainen. Personal Communication, Mar 2008.
    • (2008)
    • Kostiainen, K.1
  • 19
    • 84885941616 scopus 로고    scopus 로고
    • S. Laur and K. Nyberg. E cient mutual data authentication using manually authenticated strings. In International Conference on Cryptology and Network Security (CANS), 4301, pages 90{107, 2006.
    • S. Laur and K. Nyberg. E cient mutual data authentication using manually authenticated strings. In International Conference on Cryptology and Network Security (CANS), volume 4301, pages 90{107, 2006.
  • 23
    • 70350726915 scopus 로고    scopus 로고
    • Personal Communication, Mar
    • J. M. McCune. Personal Communication, Mar 2008.
    • (2008)
    • McCune, J.M.1
  • 30
    • 56649100493 scopus 로고    scopus 로고
    • HAPADEP: Human-assisted pure audio device pairing
    • C. Soriente, G. Tsudik, and E. Uzun. HAPADEP: human-assisted pure audio device pairing. In Information Security, pages 385-400, 2008.
    • (2008) Information Security , pp. 385-400
    • Soriente, C.1    Tsudik, G.2    Uzun, E.3
  • 31
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 32
    • 38149072454 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors
    • J. Suomalainen, J. Valkonen, and N. Asokan. Security associations in personal networks: A comparative analysis. In F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS), pages 43-57, 2007.
    • (2007) Security and Privacy in Ad-hoc and Sensor Networks Workshop (ESAS) , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 34
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Advances in Cryptology-CRYPTO, pages 309-326, 2005.
    • (2005) Advances in Cryptology-CRYPTO , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.