-
1
-
-
0034317075
-
Key agreement in ad hoc networks
-
N. Asokan and P. Ginzboorg. Key agreement in ad hoc networks. Computer Communications, 23(17):1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
3
-
-
48849113355
-
An empirical evaluation of the system usability scale
-
A. Bangor, P. T. Kortum, and J. T. Miller. An empirical evaluation of the system usability scale. International Journal of Human-Computer Interaction, 24(6):574-594, 2008.
-
(2008)
International Journal of Human-Computer Interaction
, vol.24
, Issue.6
, pp. 574-594
-
-
Bangor, A.1
Kortum, P.T.2
Miller, J.T.3
-
5
-
-
0002020833
-
SUS: A "quick and dirty" usability scale
-
P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Taylor and Francis, London
-
J. Brooke. SUS: a "quick and dirty" usability scale. In P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, London, 1996.
-
(1996)
Usability Evaluation in Industry
-
-
Brooke, J.1
-
8
-
-
0003519438
-
-
Lawrence Erlbaum Associates, Hillsdale, NJ
-
J. Cohen, P. Cohen, S. G. West, and L. S. Aiken. Applied multiple regression/correlation analysis for the behavioral sciences. Lawrence Erlbaum Associates, Hillsdale, NJ, 1983.
-
(1983)
Applied Multiple Regression/correlation Analysis for the Behavioral Sciences
-
-
Cohen, J.1
Cohen, P.2
West, S.G.3
Aiken, L.S.4
-
10
-
-
0033706465
-
Measuring usability: Are effectiveness, efficiency, and satisfaction really correlated
-
E. Frkjr, M. Hertzum, and K. Hornbk. Measuring usability: are effectiveness, efficiency, and satisfaction really correlated? In CHI: Conference on Human Factors in Computing Systems, 2000.
-
CHI: Conference on Human Factors in Computing Systems, 2000
-
-
Frkjr, E.1
Hertzum, M.2
Hornbk, K.3
-
11
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. RSA CryptoBytes, 7(1):29-37, 2004.
-
(2004)
RSA CryptoBytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
15
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In Information Security Conference (ISC), pages 44-53, 2003.
-
(2003)
Information Security Conference (ISC)
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
16
-
-
70350738597
-
Serial hook-ups: A comparative usability study of secure device pairing methods
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang. Serial hook-ups: A comparative usability study of secure device pairing methods. In SOUPS: Symposium on Usable Privacy and Security, 2009.
-
SOUPS: Symposium on Usable Privacy and Security, 2009
-
-
Kobsa, A.1
Sonawalla, R.2
Tsudik, G.3
Uzun, E.4
Wang, Y.5
-
19
-
-
77956243440
-
Alice meets bob: A comparative usability study of wireless device pairing methods for a "two-user" setting
-
abs/0907.4743
-
A. Kumar, N. Saxena, and E. Uzun. Alice meets bob: A comparative usability study of wireless device pairing methods for a "two-user" setting. CoRR, abs/0907.4743, 2009.
-
(2009)
CoRR
-
-
Kumar, A.1
Saxena, N.2
Uzun, E.3
-
23
-
-
78649983666
-
Sas-based group authentication and key agreement protocols
-
S. Laur and S. Pasini. Sas-based group authentication and key agreement protocols. In Public Key Cryptography, 2008.
-
(2008)
Public Key Cryptography
-
-
Laur, S.1
Pasini, S.2
-
38
-
-
56649111524
-
Simple and effective defense against evil twin access points
-
V. Roth et al. Simple and effective defense against evil twin access points. In ACM Conference on Wireless Network Security (WiSec), pages 220-235, 2008.
-
(2008)
ACM Conference on Wireless Network Security (WiSec)
, pp. 220-235
-
-
Roth, V.1
|