-
2
-
-
70349562717
-
Exploring the use of discrete gestures for authentication
-
Springer-Verlag, Heidelberg
-
Chong, M. K., and Marsden, G. 2009. Exploring the use of discrete gestures for authentication. In Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction (Uppsala, Sweden). INTERACT '09. Springer-Verlag, Heidelberg, 205-213.
-
(2009)
Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction (Uppsala, Sweden). INTERACT '09
, pp. 205-213
-
-
Chong, M.K.1
Marsden, G.2
-
3
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C. J., and Nyberg, K. 2004. Manual authentication for wireless devices. RSA CryptoBytes, 7 (1), 29-37.
-
(2004)
RSA CryptoBytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
4
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Springer-Verlag
-
Holmquist, L. E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., and Gellersen, H.-W. 2001. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Proceedings of the 3rd international conference on Ubiquitous Computing. UbiComp '01. Springer-Verlag, 116-122.
-
(2001)
Proceedings of the 3rd International Conference on Ubiquitous Computing. UbiComp '01
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
5
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Mayrhofer, R., and Gellersen, H. 2009. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Trans. Mob. Comput. 8 (6), 792-806.
-
(2009)
IEEE Trans. Mob. Comput.
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
6
-
-
20344391422
-
A gesture-based authentication scheme for untrusted public terminals
-
ACM Press, New York, NY, DOI=http://doi.acm.org/10.1145/1029632.1029658
-
Patel, S. N., Pierce, J. S., and Abowd, G. D. 2004. A gesture-based authentication scheme for untrusted public terminals. In Proceedings of the 17th annual ACM symposium on User interface software and technology (Santa Fe, NM, USA). UIST '04. ACM Press, New York, NY, 157-160. DOI=http://doi.acm.org/10. 1145/1029632.1029658
-
(2004)
Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology (Santa Fe, NM, USA). UIST '04
, pp. 157-160
-
-
Patel, S.N.1
Pierce, J.S.2
Abowd, G.D.3
-
7
-
-
36549058742
-
-
2nd edition, John Wiley & Sons
-
Sharp, H., Rogers, Y., and Preece, J. Interaction Design: Beyond Human-computer Interaction, 2nd edition, John Wiley & Sons, 2007.
-
(2007)
Interaction Design: Beyond Human-computer Interaction
-
-
Sharp, H.1
Rogers, Y.2
Preece, J.3
-
8
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer-Verlag
-
Stajano, F., and Anderson, R. 1999. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols: 7th International Workshop. Springer-Verlag, 172-182.
-
(1999)
Security Protocols: 7th International Workshop
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
9
-
-
84876402257
-
Ad hoc security associations for groups
-
Security and Privacy in Ad-Hoc and Sensor Networks. Springer-Verlag
-
Valkonen, J., Asokan, N., and Nyberg, K. 2006. Ad hoc security associations for groups. In Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Springer-Verlag, 150-16
-
(2006)
ESAS 2006
, pp. 150-216
-
-
Valkonen, J.1
Asokan, N.2
Nyberg, K.3
|