-
1
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
Stajano F., Meadows C., Capkun S., and Moore T. (Eds)
-
Suomalainen J., Valkonen J., and Asokan N. Security associations in personal networks: A comparative analysis. In: Stajano F., Meadows C., Capkun S., and Moore T. (Eds). Security and Privacy in Ad-hoc and Sensor Networks Workshop, ESAS vol. 4572 (2007) 43-57
-
(2007)
Security and Privacy in Ad-hoc and Sensor Networks Workshop, ESAS
, vol.4572
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
3
-
-
65449173388
-
Button-Enabled Device Association
-
BEDA
-
C. Soriente, G. Tsudik, E. Uzun, BEDA: Button-Enabled Device Association, in: International Workshop on Security for Spontaneous Interaction IWSSI, UbiComp Workshop Proceedings, 2007
-
(2007)
International Workshop on Security for Spontaneous Interaction IWSSI, UbiComp Workshop Proceedings
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
4
-
-
70349332824
-
Caveat emptor: A comparative study of secure device pairing methods
-
A. Kumar, N. Saxena, G. Tsudik, E. Uzun, Caveat emptor: A comparative study of secure device pairing methods, in: IEEE International Conference on Pervasive Computing and Communications, PerCom, 2009
-
(2009)
IEEE International Conference on Pervasive Computing and Communications, PerCom
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
7
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
Vaudenay S. Secure communications over insecure channels based on short authenticated strings. Advances in Cryptology-CRYPTO (2005)
-
(2005)
Advances in Cryptology-CRYPTO
-
-
Vaudenay, S.1
-
12
-
-
70349345021
-
Extended abstract: Secure device pairing based on a visual channel
-
N. Saxena, et al. Extended abstract: Secure device pairing based on a visual channel, in: IEEE Symposium on Security and Privacy, 2006
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
-
13
-
-
57049123749
-
Automated device pairing for asymmetric pairing scenarios
-
N. Saxena, M.B. Uddin, Automated device pairing for asymmetric pairing scenarios, in: Information and Communications Security, ICICS, 2008, pp. 311-327
-
(2008)
Information and Communications Security, ICICS
, pp. 311-327
-
-
Saxena, N.1
Uddin, M.B.2
-
14
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Springer
-
Boyko V., MacKenzie P., and Patel S. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Advances in Cryptology-Eurocrypt (2000), Springer 156-171
-
(2000)
Advances in Cryptology-Eurocrypt
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
15
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano, R.J. Anderson, The resurrecting duckling: Security issues for ad-hoc wireless networks, in: Security Protocols Workshop, 1999
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
16
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
D. Balfanz, et al. Network-in-a-box: How to set up a secure wireless network in under a minute, in: USENIX Security, 2004, pp. 207-222
-
(2004)
USENIX Security
, pp. 207-222
-
-
Balfanz, D.1
-
20
-
-
56649111524
-
Simple and effective defense against evil twin access points
-
V. Roth, et al. Simple and effective defense against evil twin access points, in: ACM Conference on Wireless Network Security, WISEC, 2008, pp. 220-235
-
(2008)
ACM Conference on Wireless Network Security, WISEC
, pp. 220-235
-
-
Roth, V.1
-
27
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
ISC
-
T. Kindberg, K. Zhang, Validating and securing spontaneous associations between wireless devices, in: Information Security Conference, ISC, 2003, pp. 44-53
-
(2003)
Information Security Conference
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
28
-
-
34548146342
-
A human-verifiable authentication protocol using visible laser light
-
IEEE Computer Society Washington, DC, USA
-
Mayrhofer R., and Welch M. A human-verifiable authentication protocol using visible laser light. International Conference on Availability, Reliability and Security (ARES) (2007), IEEE Computer Society Washington, DC, USA 1143-1148
-
(2007)
International Conference on Availability, Reliability and Security (ARES)
, pp. 1143-1148
-
-
Mayrhofer, R.1
Welch, M.2
-
29
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
UbiComp, Springer-Verlag, London, UK
-
Holmquist L.E., et al. Smart-its friends: A technique for users to easily establish connections between smart artefacts. Ubiquitous Computing. UbiComp (2001), Springer-Verlag, London, UK 116-122
-
(2001)
Ubiquitous Computing
, pp. 116-122
-
-
Holmquist, L.E.1
-
30
-
-
55749083053
-
Shake well before use: Authentication based on accelerometer data
-
PERVASIVE, Springer
-
Mayrhofer R., and Gellersen H. Shake well before use: Authentication based on accelerometer data. Pervasive Computing. PERVASIVE (2007), Springer
-
(2007)
Pervasive Computing
-
-
Mayrhofer, R.1
Gellersen, H.2
-
33
-
-
70449696212
-
-
Personal Communication, Mar
-
J.M. McCune, Personal Communication, Mar. 2008
-
(2008)
-
-
McCune, J.M.1
-
34
-
-
70449688705
-
-
Personal Communication, Mar
-
K. Kostiainen, Personal Communication, Mar. 2008
-
(2008)
-
-
Kostiainen, K.1
-
35
-
-
0346271799
-
Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
-
Faulkner L. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers 35 3 (2003) 379-383
-
(2003)
Behavior Research Methods, Instruments, & Computers
, vol.35
, Issue.3
, pp. 379-383
-
-
Faulkner, L.1
-
36
-
-
0003519438
-
-
Lawrence Erlbaum Associates, Hillsdale, NJ
-
Cohen J., Cohen P., West S.G., and Aiken L.S. Applied multiple regression/correlation analysis for the behavioral sciences (1983), Lawrence Erlbaum Associates, Hillsdale, NJ
-
(1983)
Applied multiple regression/correlation analysis for the behavioral sciences
-
-
Cohen, J.1
Cohen, P.2
West, S.G.3
Aiken, L.S.4
-
37
-
-
0033706465
-
Measuring usability: Are effectiveness, efficiency, and satisfaction really correlated?
-
E. Frkjr, M. Hertzum, K. Hornbk, Measuring usability: Are effectiveness, efficiency, and satisfaction really correlated? CHI '00: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2000 pp. 345-352, http://doi.acm.org/10.1145/332040.332455
-
(2000)
CHI '00: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 345-352
-
-
Frkjr, E.1
Hertzum, M.2
Hornbk, K.3
|