메뉴 건너뛰기




Volumn 16, Issue 1, 2012, Pages 77-89

Usability classification for spontaneous device association

Author keywords

[No Author keywords available]

Indexed keywords

END-USERS; SPONTANEOUS INTERACTION; SYSTEM DESIGNERS; USABILITY FACTORS; WIRELESS DEVICES;

EID: 84857364160     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-011-0421-1     Document Type: Article
Times cited : (29)

References (43)
  • 5
    • 60149100977 scopus 로고    scopus 로고
    • Bluetooth Special Interest Group, (revision v10r00)
    • Bluetooth Special Interest Group (2006) Simple pairing whitepaper (revision v10r00)
    • (2006) Simple Pairing Whitepaper
  • 8
    • 79958141385 scopus 로고    scopus 로고
    • Classification of spontaneous device association from a usability perspective
    • Chong MK, Gellersen H (2010) Classification of spontaneous device association from a usability perspective. In: IWSSI/SPMU 2010, pp 1-7
    • (2010) IWSSI/SPMU 2010 , pp. 1-7
    • Chong, M.K.1    Gellersen, H.2
  • 9
    • 84857358059 scopus 로고    scopus 로고
    • GesturePIN: Using discrete gestures for associating mobile devices
    • Chong MK, Marsden G, Gellersen H (2010) GesturePIN: using discrete gestures for associating mobile devices. In: MobileHCI 2010
    • (2010) MobileHCI 2010
    • Chong, M.K.1    Marsden, G.2    Gellersen, H.3
  • 10
    • 46649087024 scopus 로고
    • The information capacity of the human motor system in controlling the amplitude of movement
    • Fitts PM (1954) The information capacity of the human motor system in controlling the amplitude of movement. J Exp Psychol 47(6):381-391
    • (1954) J Exp Psychol , vol.47 , Issue.6 , pp. 381-391
    • Fitts, P.M.1
  • 11
  • 15
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • Ubicomp 2001: Ubiquitous Computing
    • Holmquist LE, Mattern F, Schiele B, Alahuhta P, Beigl M, Gellersen H-W (2001) Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Ubi- Comp '01: Proceedings of the 3rd international conference on ubiquitous computing. Springer, pp 116-122 (Pubitemid 33347301)
    • (2001) Lecture Notes in Computer Science , Issue.2201 , pp. 116-122
    • Holmquist, L.E.1    Mattern, F.2    Schiele, B.3    Alahuhta, P.4    Beigl, M.5    Gellersen, H.-W.6
  • 16
    • 79955468168 scopus 로고    scopus 로고
    • Influence of user perception, security needs, and social factors on device pairing method choices
    • Ion I, Langheinrich M, Kumaraguru P, Capkun S (2010) Influence of user perception, security needs, and social factors on device pairing method choices. In: SOUPS '10
    • (2010) SOUPS '10
    • Ion, I.1    Langheinrich, M.2    Kumaraguru, P.3    Capkun, S.4
  • 18
    • 84857366247 scopus 로고    scopus 로고
    • Secure mobile ad-hoc interactions: Reasoning about out-of-band (oob) channels
    • Kainda R, Flechais I, Roscoe AW (2010) Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels. In: IWSSI/SPMU 2010, pp 10-15
    • (2010) IWSSI/SPMU 2010 , pp. 10-15
    • Kainda, R.1    Flechais, I.2    Roscoe, A.W.3
  • 19
    • 79958168340 scopus 로고    scopus 로고
    • Two heads are better than one: Security and usability of device associations in group scenarios
    • ACM Press
    • Kainda R, Flechais I, Roscoe AW (2010) Two heads are better than one: security and usability of device associations in group scenarios. In: Proceedings of SOUPS 2010. ACM Press
    • (2010) Proceedings of SOUPS 2010
    • Kainda, R.1    Flechais, I.2    Roscoe, A.W.3
  • 21
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • Springer
    • Kindberg T, Zhang K (2003) Validating and securing spontaneous associations between wireless devices. In: ISC 2003: information security. Springer, pp 44-53
    • (2003) ISC 2003: Information Security , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 22
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • Springer
    • Laur S, Nyberg K (2006) Efficient mutual data authentication using manually authenticated strings. In: Cryptology and network security, Springer, pp 90-107
    • (2006) Cryptology and Network Security , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 23
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • Mayrhofer R, Gellersen H (2009) Shake well before use: intuitive and secure pairing of mobile devices. IEEE Trans Mobile Comput 8(6):792-806
    • (2009) IEEE Trans Mobile Comput , vol.8 , Issue.6 , pp. 792-806
    • Mayrhofer, R.1    Gellersen, H.2
  • 24
    • 38149135757 scopus 로고    scopus 로고
    • Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction
    • Springer
    • Mayrhofer R, Gellersen H, Hazas M (2007) Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction. In: UbiComp 2007: ubiquitous computing, Springer, pp 199-216
    • (2007) UbiComp 2007: Ubiquitous Computing , pp. 199-216
    • Mayrhofer, R.1    Gellersen, H.2    Hazas, M.3
  • 26
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • McCune JM, Perrig A, Reiter MK (2005) Seeing-Is-believing: using camera phones for human-verifiable authentication. In: SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 110-124 (Pubitemid 41543650)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 30
    • 32244434861 scopus 로고    scopus 로고
    • SyncTap: Synchronous user operation for spontaneous network connection
    • Rekimoto J (2004) SyncTap: synchronous user operation for spontaneous network connection. Pers Ubiquit Comput 8(2):126-134
    • (2004) Pers Ubiquit Comput , vol.8 , Issue.2 , pp. 126-134
    • Rekimoto, J.1
  • 31
    • 29144477685 scopus 로고    scopus 로고
    • Proximal interactions: A direct manipulation technique for wireless networking
    • IOS Press
    • Rekimoto J, Ayatsuka Y, Kohno M, Oba H (2003) Proximal interactions: a direct manipulation technique for wireless networking. In: INTERACT '03, IOS Press, pp 511-518
    • (2003) INTERACT '03 , pp. 511-518
    • Rekimoto, J.1    Ayatsuka, Y.2    Kohno, M.3    Oba, H.4
  • 37
    • 61849147296 scopus 로고    scopus 로고
    • Secure pairing of interface constrained devices
    • Soriente C, Tsudik G, Uzun E (2009) Secure pairing of interface constrained devices. Int J Secur Netw 4(1/2):17-26
    • (2009) Int J Secur Netw , vol.4 , Issue.1-2 , pp. 17-26
    • Soriente, C.1    Tsudik, G.2    Uzun, E.3
  • 39
    • 61849117271 scopus 로고    scopus 로고
    • Standards for security associations in personal networks: A comparative analysis
    • Suomalainen J, Valkonen J, Asokan N (2009) Standards for security associations in personal networks: a comparative analysis. Int J Secur Netw 4(1/2):87-100
    • (2009) Int J Secur Netw , vol.4 , Issue.1-2 , pp. 87-100
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 41
    • 70349998773 scopus 로고    scopus 로고
    • A taxonomy for and analysis of multi-person-display ecosystems
    • Terrenghi L, Quigley A, Dix A (2009) A taxonomy for and analysis of multi-person-display ecosystems. Pers Ubiquit Comput 13(8):583-598
    • (2009) Pers Ubiquit Comput , vol.13 , Issue.8 , pp. 583-598
    • Terrenghi, L.1    Quigley, A.2    Dix, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.