-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
(NDSS 2002)
-
Balfanz, D., Smetters, D.K., Stewart, P., and Chi Wong, H. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. Network and Distributed Systems Security (NDSS 2002), (2002).
-
(2002)
Proc. Network and Distributed Systems Security
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
4
-
-
33745816410
-
Why phishing works
-
ACM Press
-
Dhamija, R., Tygar, J. D., and Hearst, M. Why phishing works. In Proc. CHI 2006. ACM Press (2006), 581-590.
-
(2006)
Proc. CHI 2006
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
5
-
-
0038789791
-
Persuasive technology: Using computers to change what we think and do
-
Fogg, B. J. Persuasive Technology: Using computers to change what we think and do. San Francisco: Morgan Kaufman. (2002).
-
(2002)
San Francisco: Morgan Kaufman
-
-
Fogg, B.J.1
-
6
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, J. and Nyberg, K. Manual authentication for wireless devices. RSA Cryptobytes 7(1), (2004), 29-37.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, J.2
Nyberg, K.3
-
7
-
-
0010602271
-
System software for ubiquitous computing
-
Kindberg, T., and Fox, A. System software for ubiquitous computing. In IEEE Pervasive Computing 1(1), (2002), 70-81.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.1
, pp. 70-81
-
-
Kindberg, T.1
Fox, A.2
-
8
-
-
57649195230
-
Measuring trust in wi-fi hotspots
-
ACM Press
-
Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Stanton Fraser, D., and Jay, T. Measuring trust in wi-fi hotspots. In Proc. CHI 2008. ACM Press (2008), 173-182.
-
(2008)
Proc. CHI 2008
, pp. 173-182
-
-
Kindberg, T.1
O'Neill, E.2
Bevan, C.3
Kostakos, V.4
Stanton Fraser, D.5
Jay, T.6
-
10
-
-
27544489075
-
Seeing-isbelieving: Using camera phones for human-verifiable authentication
-
McCune, J.M., Perrig, A., and Reiter, M.K. Seeing-isbelieving: using camera phones for human-verifiable authentication. In IEEE Security and Privacy, (2005), 110-124.
-
(2005)
IEEE Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
11
-
-
84899281571
-
Trust builders and trustbusters: The role of trust cues in interfaces to ecommerce applications
-
Kluwer, London
-
Riegelsberger, J. and Sasse, M.A. Trust builders and trustbusters: the role of trust cues in interfaces to ecommerce applications. In Proc. E-Commerce, E-Society, and E-Government 2001. Kluwer, London (2001), 17-30.
-
(2001)
Proc. E-Commerce, E-Society, and E-Government 2001
, pp. 17-30
-
-
Riegelsberger, J.1
Sasse, M.A.2
-
13
-
-
56649111524
-
Simple and effective defenses against evil twin access points
-
Roth, V., Polak, W., Rieffel, E., and Turner, T. Simple and effective defenses against evil twin access points. In Proc. ACM Conference on Wireless Network Security (WiSec), (2008).
-
(2008)
Proc. ACM Conference on Wireless Network Security (WiSec)
-
-
Roth, V.1
Polak, W.2
Rieffel, E.3
Turner, T.4
-
14
-
-
33751023773
-
Secure device pairing based on a visual channel (extended abstract)
-
Saxena, N., Ekberg, J-E., Kostiainen, K., and Asokan, N. Secure device pairing based on a visual channel (extended abstract). In Proc. IEEE Symposium on Security and Privacy, (2006).
-
(2006)
Proc. IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
15
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Uzun, E., Karvonen, K., and Asokan, N. Usability analysis of secure pairing methods. In Financial Cryptography and Data Security, (2008), 307-324.
-
(2008)
Financial Cryptography and Data Security
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
16
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Vaudenay, S. Secure communications over insecure channels based on short authenticated strings. In Proc. Advances in Cryptology - CRYPTO 2005, (2005), 309-326.
-
(2005)
Proc. Advances in Cryptology - CRYPTO 2005
, pp. 309-326
-
-
Vaudenay, S.1
|