-
2
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
D. Balfanz et al. Network-in-a-box: How to set up a secure wireless network in under a minute. In USENIX Security, pages 207-222, 2004.
-
(2004)
USENIX Security
, pp. 207-222
-
-
Balfanz, D.1
-
3
-
-
3042657129
-
Provably secure password-authenticated key exchange using diffie-heilman
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using diffie-heilman. Eurocrypt, 2000.
-
(2000)
Eurocrypt
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
8
-
-
0742293892
-
Smart-its friends: A technique for users to easily establish connections between smart artifacts
-
L. Holmquist et al. Smart-its friends: A technique for users to easily establish connections between smart artifacts. In Ubicomp, 2001.
-
(2001)
Ubicomp
-
-
Holmquist, L.1
-
9
-
-
33748571880
-
Mobile data service fuels the desire for uniqueness
-
S.-J. Hong, K. Y. Tam, and J. Kim. Mobile data service fuels the desire for uniqueness. Communications of the ACM, 49(9) 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
-
-
Hong, S.-J.1
Tam, K.Y.2
Kim, J.3
-
10
-
-
79955468168
-
Influence of user perception, security needs, and social factors on device pairing method choices
-
I. Ion et al. Influence of user perception, security needs, and social factors on device pairing method choices. In SOUPS: Symposium on Usable Privacy and Security, 2010.
-
(2010)
SOUPS: Symposium on Usable Privacy and Security
-
-
Ion, I.1
-
11
-
-
79958168340
-
Two heads are better than one: Security and usability of device associations in group scenarios
-
R. Kainda, I. Flechais, and A. Roscoe. Two heads are better than one: Security and usability of device associations in group scenarios. In SOUPS: Symposium on Usable Privacy and Security, pages 1-13, 2010.
-
(2010)
SOUPS: Symposium on Usable Privacy and Security
, pp. 1-13
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.3
-
13
-
-
84976998771
-
The application of electronic computers to factor analysis
-
H. Kaiser. The application of electronic computers to factor analysis. Educational and psychological measurement, 20(1):141-151, 1960.
-
(1960)
Educational and Psychological Measurement
, vol.20
, Issue.1
, pp. 141-151
-
-
Kaiser, H.1
-
15
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In Information Security Conference (ISC), pages 44-53, 2003.
-
(2003)
Information Security Conference (ISC)
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
16
-
-
70350738597
-
Serial hook-ups: A comparative usability study of secure device pairing methods
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang. Serial hook-ups: A comparative usability study of secure device pairing methods. In SOUPS: Symposium on Usable Privacy and Security, 2009.
-
(2009)
SOUPS: Symposium on Usable Privacy and Security
-
-
Kobsa, A.1
Sonawalla, R.2
Tsudik, G.3
Uzun, E.4
Wang, Y.5
-
20
-
-
0001859044
-
A technique for the measurement of attitudes
-
R. Likert. A technique for the measurement of attitudes. Archives of Psychology, 66:68-71, 1932.
-
(1932)
Archives of Psychology
, vol.66
, pp. 68-71
-
-
Likert, R.1
-
21
-
-
70450247064
-
Xshare: Supporting impromptu sharing of mobile phones
-
Y. Liu, A. Rahmati, Y. Huang, H. Jang, L. Zhong, Y. Zhang, and S. Zhang. xshare: supporting impromptu sharing of mobile phones. In MobiSys '09: Conference on Mobile systems, applications, and services, 2009.
-
(2009)
MobiSys '09: Conference on Mobile Systems, Applications, and Services
-
-
Liu, Y.1
Rahmati, A.2
Huang, Y.3
Jang, H.4
Zhong, L.5
Zhang, Y.6
Zhang, S.7
-
25
-
-
78650034784
-
Groupthink: Usability of secure group association for wireless devices
-
R. Nithyanand et al. Groupthink: usability of secure group association for wireless devices. In Ubicomp, pages 331-340, 2010.
-
(2010)
Ubicomp
, pp. 331-340
-
-
Nithyanand, R.1
-
29
-
-
56649111524
-
Simple and effective defense against evil twin access points
-
V. Roth et al. Simple and effective defense against evil twin access points. In ACM Conference on Wireless Network Security (WiSec), pages 220-235, 2008.
-
(2008)
ACM Conference on Wireless Network Security (WiSec)
, pp. 220-235
-
-
Roth, V.1
-
30
-
-
70349345021
-
Extended abstract: Secure device pairing based on a visual channel
-
N. Saxena et al. Extended abstract: Secure device pairing based on a visual channel. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Saxena, N.1
-
33
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
-
(1999)
Security Protocols Workshop
-
-
Stajano, F.1
Anderson, R.J.2
-
35
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay. Secure communications over insecure channels based on short authenticated strings. In International Cryptology Conference (CRYPTO), 2005.
-
(2005)
International Cryptology Conference (CRYPTO)
-
-
Vaudenay, S.1
|