메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2315-2324

Pairing devices for social interactions: A comparative usability evaluation

Author keywords

Experimentation; Human factors; Security

Indexed keywords

HUMAN ENGINEERING; RADIO COMMUNICATION;

EID: 79958132756     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1978942.1979282     Document Type: Conference Paper
Times cited : (19)

References (35)
  • 2
    • 85084163516 scopus 로고    scopus 로고
    • Network-in-a-box: How to set up a secure wireless network in under a minute
    • D. Balfanz et al. Network-in-a-box: How to set up a secure wireless network in under a minute. In USENIX Security, pages 207-222, 2004.
    • (2004) USENIX Security , pp. 207-222
    • Balfanz, D.1
  • 3
    • 3042657129 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-heilman
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using diffie-heilman. Eurocrypt, 2000.
    • (2000) Eurocrypt
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 8
    • 0742293892 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artifacts
    • L. Holmquist et al. Smart-its friends: A technique for users to easily establish connections between smart artifacts. In Ubicomp, 2001.
    • (2001) Ubicomp
    • Holmquist, L.1
  • 9
    • 33748571880 scopus 로고    scopus 로고
    • Mobile data service fuels the desire for uniqueness
    • S.-J. Hong, K. Y. Tam, and J. Kim. Mobile data service fuels the desire for uniqueness. Communications of the ACM, 49(9) 2006.
    • (2006) Communications of the ACM , vol.49 , Issue.9
    • Hong, S.-J.1    Tam, K.Y.2    Kim, J.3
  • 10
    • 79955468168 scopus 로고    scopus 로고
    • Influence of user perception, security needs, and social factors on device pairing method choices
    • I. Ion et al. Influence of user perception, security needs, and social factors on device pairing method choices. In SOUPS: Symposium on Usable Privacy and Security, 2010.
    • (2010) SOUPS: Symposium on Usable Privacy and Security
    • Ion, I.1
  • 11
    • 79958168340 scopus 로고    scopus 로고
    • Two heads are better than one: Security and usability of device associations in group scenarios
    • R. Kainda, I. Flechais, and A. Roscoe. Two heads are better than one: Security and usability of device associations in group scenarios. In SOUPS: Symposium on Usable Privacy and Security, pages 1-13, 2010.
    • (2010) SOUPS: Symposium on Usable Privacy and Security , pp. 1-13
    • Kainda, R.1    Flechais, I.2    Roscoe, A.3
  • 13
    • 84976998771 scopus 로고
    • The application of electronic computers to factor analysis
    • H. Kaiser. The application of electronic computers to factor analysis. Educational and psychological measurement, 20(1):141-151, 1960.
    • (1960) Educational and Psychological Measurement , vol.20 , Issue.1 , pp. 141-151
    • Kaiser, H.1
  • 15
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In Information Security Conference (ISC), pages 44-53, 2003.
    • (2003) Information Security Conference (ISC) , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 20
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • R. Likert. A technique for the measurement of attitudes. Archives of Psychology, 66:68-71, 1932.
    • (1932) Archives of Psychology , vol.66 , pp. 68-71
    • Likert, R.1
  • 25
    • 78650034784 scopus 로고    scopus 로고
    • Groupthink: Usability of secure group association for wireless devices
    • R. Nithyanand et al. Groupthink: usability of secure group association for wireless devices. In Ubicomp, pages 331-340, 2010.
    • (2010) Ubicomp , pp. 331-340
    • Nithyanand, R.1
  • 28
  • 29
    • 56649111524 scopus 로고    scopus 로고
    • Simple and effective defense against evil twin access points
    • V. Roth et al. Simple and effective defense against evil twin access points. In ACM Conference on Wireless Network Security (WiSec), pages 220-235, 2008.
    • (2008) ACM Conference on Wireless Network Security (WiSec) , pp. 220-235
    • Roth, V.1
  • 30
    • 70349345021 scopus 로고    scopus 로고
    • Extended abstract: Secure device pairing based on a visual channel
    • N. Saxena et al. Extended abstract: Secure device pairing based on a visual channel. In IEEE Symposium on Security and Privacy, 2006.
    • (2006) IEEE Symposium on Security and Privacy
    • Saxena, N.1
  • 33
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 35
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In International Cryptology Conference (CRYPTO), 2005.
    • (2005) International Cryptology Conference (CRYPTO)
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.