메뉴 건너뛰기




Volumn , Issue , 2010, Pages 331-340

Groupthink: Usability of secure group association for wireless devices

Author keywords

device pairing; group association; usability

Indexed keywords

ASSOCIATION METHODS; DEVICE PAIRING; EVALUATION CRITERIA; GROUP ASSOCIATION; NUMBER OF METHODS; PERSONAL WIRELESS DEVICES; POTENTIAL ATTACK; SECURITY CONTEXT; SIMPLE METHOD; SMALL GROUPS; USABILITY; USABILITY FACTORS; USABILITY STUDIES; WIRELESS DEVICES;

EID: 78650034784     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1864349.1864399     Document Type: Conference Paper
Times cited : (27)

References (40)
  • 1
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • N. Asokan and P. Ginzboorg. Key agreement in ad hoc networks. Computer Communications, 23(17):1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 5
    • 0002020833 scopus 로고    scopus 로고
    • SUS: A "quick and dirty" usability scale
    • P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Taylor and Francis, London
    • J. Brooke. SUS: a "quick and dirty" usability scale. In P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, London, 1996.
    • (1996) Usability Evaluation in Industry
    • Brooke, J.1
  • 11
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. RSA CryptoBytes, 7(1):29-37, 2004.
    • (2004) RSA CryptoBytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 15
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In Information Security Conference (ISC), pages 44-53, 2003.
    • (2003) Information Security Conference (ISC) , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 19
    • 77956243440 scopus 로고    scopus 로고
    • Alice meets bob: A comparative usability study of wireless device pairing methods for a "two-user" setting
    • abs/0907.4743
    • A. Kumar, N. Saxena, and E. Uzun. Alice meets bob: A comparative usability study of wireless device pairing methods for a "two-user" setting. CoRR, abs/0907.4743, 2009.
    • (2009) CoRR
    • Kumar, A.1    Saxena, N.2    Uzun, E.3
  • 23
    • 78649983666 scopus 로고    scopus 로고
    • Sas-based group authentication and key agreement protocols
    • S. Laur and S. Pasini. Sas-based group authentication and key agreement protocols. In Public Key Cryptography, 2008.
    • (2008) Public Key Cryptography
    • Laur, S.1    Pasini, S.2
  • 33
  • 38
    • 56649111524 scopus 로고    scopus 로고
    • Simple and effective defense against evil twin access points
    • V. Roth et al. Simple and effective defense against evil twin access points. In ACM Conference on Wireless Network Security (WiSec), pages 220-235, 2008.
    • (2008) ACM Conference on Wireless Network Security (WiSec) , pp. 220-235
    • Roth, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.