-
1
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
USENIX Association
-
Balfanz D, Durfee G, Grinter RE, Smetters DK, Stewart P (2004) Network-in-a-box: how to set up a secure wireless network in under a minute. In: SSYM'04: Proceedings of the 13th conference on USENIX security symposium, USENIX Association, pp 207-222
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 207-222
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetters, D.K.4
Stewart, P.5
-
5
-
-
60149100977
-
-
Bluetooth Special Interest Group, (revision v10r00)
-
Bluetooth Special Interest Group (2006) Simple pairing whitepaper (revision v10r00)
-
(2006)
Simple Pairing Whitepaper
-
-
-
6
-
-
61849134762
-
Secure pairing with biometrics
-
Buhan I, Boom B, Doumen J, Hartel PH, Veldhuis RNJ (2009) Secure pairing with biometrics. Int J Secur Netw 4(1/2): 27-42
-
(2009)
Int J Secur Netw
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel, P.H.4
Veldhuis, R.N.J.5
-
7
-
-
77953853641
-
Shake them up!: A movementbased pairing protocol for cpu-constrained devices
-
Castelluccia C, Mutaf P (2005) Shake them up!: a movementbased pairing protocol for cpu-constrained devices. In: MobiSys '05: Proceedings of the 3rd international conference on mobile systems, applications, and services, ACM, pp 51-64
-
(2005)
MobiSys '05: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, ACM
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
8
-
-
79958141385
-
Classification of spontaneous device association from a usability perspective
-
Chong MK, Gellersen H (2010) Classification of spontaneous device association from a usability perspective. In: IWSSI/SPMU 2010, pp 1-7
-
(2010)
IWSSI/SPMU 2010
, pp. 1-7
-
-
Chong, M.K.1
Gellersen, H.2
-
9
-
-
84857358059
-
GesturePIN: Using discrete gestures for associating mobile devices
-
Chong MK, Marsden G, Gellersen H (2010) GesturePIN: using discrete gestures for associating mobile devices. In: MobileHCI 2010
-
(2010)
MobileHCI 2010
-
-
Chong, M.K.1
Marsden, G.2
Gellersen, H.3
-
10
-
-
46649087024
-
The information capacity of the human motor system in controlling the amplitude of movement
-
Fitts PM (1954) The information capacity of the human motor system in controlling the amplitude of movement. J Exp Psychol 47(6):381-391
-
(1954)
J Exp Psychol
, vol.47
, Issue.6
, pp. 381-391
-
-
Fitts, P.M.1
-
12
-
-
61849184822
-
Using audio in secure device pairing
-
Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E (2009) Using audio in secure device pairing. Int J Secur Netw 4(1/2):57-68
-
(2009)
Int J Secur Netw
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
13
-
-
33947635594
-
Loud and Clear: Human-verifiable authentication based on audio
-
IEEE Computer Society
-
Goodrich MT, Sirivianos M, Solis J, Tsudik G, Uzun E (2006) Loud and Clear: Human-verifiable authentication based on audio. In: ICDCS '06: Proceedings of the 26th IEEE international conference on distributed computing systems, IEEE Computer Society, p 10.
-
(2006)
ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
15
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artefacts
-
Ubicomp 2001: Ubiquitous Computing
-
Holmquist LE, Mattern F, Schiele B, Alahuhta P, Beigl M, Gellersen H-W (2001) Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Ubi- Comp '01: Proceedings of the 3rd international conference on ubiquitous computing. Springer, pp 116-122 (Pubitemid 33347301)
-
(2001)
Lecture Notes in Computer Science
, Issue.2201
, pp. 116-122
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.-W.6
-
16
-
-
79955468168
-
Influence of user perception, security needs, and social factors on device pairing method choices
-
Ion I, Langheinrich M, Kumaraguru P, Capkun S (2010) Influence of user perception, security needs, and social factors on device pairing method choices. In: SOUPS '10
-
(2010)
SOUPS '10
-
-
Ion, I.1
Langheinrich, M.2
Kumaraguru, P.3
Capkun, S.4
-
18
-
-
84857366247
-
Secure mobile ad-hoc interactions: Reasoning about out-of-band (oob) channels
-
Kainda R, Flechais I, Roscoe AW (2010) Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels. In: IWSSI/SPMU 2010, pp 10-15
-
(2010)
IWSSI/SPMU 2010
, pp. 10-15
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.W.3
-
19
-
-
79958168340
-
Two heads are better than one: Security and usability of device associations in group scenarios
-
ACM Press
-
Kainda R, Flechais I, Roscoe AW (2010) Two heads are better than one: security and usability of device associations in group scenarios. In: Proceedings of SOUPS 2010. ACM Press
-
(2010)
Proceedings of SOUPS 2010
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.W.3
-
21
-
-
35248872559
-
Validating and securing spontaneous associations between wireless devices
-
Springer
-
Kindberg T, Zhang K (2003) Validating and securing spontaneous associations between wireless devices. In: ISC 2003: information security. Springer, pp 44-53
-
(2003)
ISC 2003: Information Security
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
22
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
Springer
-
Laur S, Nyberg K (2006) Efficient mutual data authentication using manually authenticated strings. In: Cryptology and network security, Springer, pp 90-107
-
(2006)
Cryptology and Network Security
, pp. 90-107
-
-
Laur, S.1
Nyberg, K.2
-
23
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Mayrhofer R, Gellersen H (2009) Shake well before use: intuitive and secure pairing of mobile devices. IEEE Trans Mobile Comput 8(6):792-806
-
(2009)
IEEE Trans Mobile Comput
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
24
-
-
38149135757
-
Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction
-
Springer
-
Mayrhofer R, Gellersen H, Hazas M (2007) Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction. In: UbiComp 2007: ubiquitous computing, Springer, pp 199-216
-
(2007)
UbiComp 2007: Ubiquitous Computing
, pp. 199-216
-
-
Mayrhofer, R.1
Gellersen, H.2
Hazas, M.3
-
26
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
McCune JM, Perrig A, Reiter MK (2005) Seeing-Is-believing: using camera phones for human-verifiable authentication. In: SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 110-124 (Pubitemid 41543650)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
27
-
-
33745926210
-
LoKey: Leveraging the SMS network in decentralized, end-to-end trust establishment
-
Pervasive Computing - 4th International Conference, PERVASIVE 2006, Proceedings
-
Nicholson AJ, Smith IE, Hughes J, Noble BD (2006) LoKey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Pervasive computing. Springer, pp 202-219 (Pubitemid 44044759)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3968
, pp. 202-219
-
-
Nicholso, A.J.1
Smith, I.E.2
Hughes, J.3
Noble, B.D.4
-
28
-
-
33745844425
-
TAP: Touch-and-play
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
Park DG, Kim JK, Sung JB, Hwang JH, Hyung CH, Kang SW (2006) TAP: Touch-And-Play. In: CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, pp 677-680 (Pubitemid 44032156)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.2
, pp. 677-680
-
-
Park, D.G.1
Kim, J.K.2
Sung, J.B.3
Hwang, J.H.4
Hyung, C.H.5
Kang, S.W.6
-
30
-
-
32244434861
-
SyncTap: Synchronous user operation for spontaneous network connection
-
Rekimoto J (2004) SyncTap: synchronous user operation for spontaneous network connection. Pers Ubiquit Comput 8(2):126-134
-
(2004)
Pers Ubiquit Comput
, vol.8
, Issue.2
, pp. 126-134
-
-
Rekimoto, J.1
-
31
-
-
29144477685
-
Proximal interactions: A direct manipulation technique for wireless networking
-
IOS Press
-
Rekimoto J, Ayatsuka Y, Kohno M, Oba H (2003) Proximal interactions: a direct manipulation technique for wireless networking. In: INTERACT '03, IOS Press, pp 511-518
-
(2003)
INTERACT '03
, pp. 511-518
-
-
Rekimoto, J.1
Ayatsuka, Y.2
Kohno, M.3
Oba, H.4
-
32
-
-
33751023773
-
Secure device pairing based on a visual channel (short paper)
-
IEEE Computer Society
-
Saxena N, Ekberg J-E, Kostiainen K, Asokan N (2006) Secure device pairing based on a visual channel (short paper). In: SP '06: Proceedings of the 2006 IEEE symposium on security and privacy, IEEE Computer Society, pp 306-313
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
37
-
-
61849147296
-
Secure pairing of interface constrained devices
-
Soriente C, Tsudik G, Uzun E (2009) Secure pairing of interface constrained devices. Int J Secur Netw 4(1/2):17-26
-
(2009)
Int J Secur Netw
, vol.4
, Issue.1-2
, pp. 17-26
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
39
-
-
61849117271
-
Standards for security associations in personal networks: A comparative analysis
-
Suomalainen J, Valkonen J, Asokan N (2009) Standards for security associations in personal networks: a comparative analysis. Int J Secur Netw 4(1/2):87-100
-
(2009)
Int J Secur Netw
, vol.4
, Issue.1-2
, pp. 87-100
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
41
-
-
70349998773
-
A taxonomy for and analysis of multi-person-display ecosystems
-
Terrenghi L, Quigley A, Dix A (2009) A taxonomy for and analysis of multi-person-display ecosystems. Pers Ubiquit Comput 13(8):583-598
-
(2009)
Pers Ubiquit Comput
, vol.13
, Issue.8
, pp. 583-598
-
-
Terrenghi, L.1
Quigley, A.2
Dix, A.3
|