Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Synchronous gestures for multiple persons and computers
Proceedings of the 16th annual ACM symposium on User interface software and technology
Stitching: pen gestures that span multiple displays
Proceedings of the working conference on Advanced visual interfaces
A gesture-based authentication scheme for untrusted public terminals
Proceedings of the 17th annual ACM symposium on User interface software and technology
Maximizing the guessability of symbolic input
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secure Device Pairing based on a Visual Channel (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
A Human-Verifiable Authentication Protocol Using Visible Laser Light
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
BlueTable: connecting wireless mobile devices on interactive surfaces using vision-based handshaking
GI '07 Proceedings of Graphics Interface 2007
Secure pairing with biometrics
International Journal of Security and Networks
User-defined gestures for surface computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
Serial hook-ups: a comparative usability study of secure device pairing methods
Proceedings of the 5th Symposium on Usable Privacy and Security
Usability and security of out-of-band channels in secure device pairing protocols
Proceedings of the 5th Symposium on Usable Privacy and Security
Analysis of natural gestures for controlling robot teams on multi-touch tabletop surfaces
Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces
Investigating multi-touch and pen gestures for diagram editing on interactive surfaces
Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces
How users manipulate deformable displays as input devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Usability analysis of secure pairing methods
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
Influence of user perception, security needs, and social factors on device pairing method choices
Proceedings of the Sixth Symposium on Usable Privacy and Security
User-defined gestures for connecting mobile phones, public displays, and tabletops
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
GesturePIN: using discrete gestures for associating mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
PhoneTouch: a technique for direct phone interaction on surfaces
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
SyncTap: synchronous user operation for spontaneous network connection
Personal and Ubiquitous Computing
EasyGroups: binding mobile devices for collaborative interactions
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Device communication: a multi-modal communication platform for internet connected televisions
Proceedings of the 10th European conference on Interactive tv and video
Proceedings of the 2012 ACM international conference on Interactive tabletops and surfaces
How groups of users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.01 |
In a wireless world, users can establish connections between devices spontaneously, and unhampered by cables. However, in the absence of cables, what is the natural interaction to connect one device with another? A wide range of device association techniques have been demonstrated, but it has remained an open question what actions users would spontaneously choose for device association. We contribute a study eliciting device association actions from non-technical users without premeditation. Over 700 user-defined actions were collected for 37 different device combinations. We present a classification of user-defined actions, and observations of the users' rationale. Our findings indicate that there is no single most spontaneous action; instead five prominent categories of user-defined actions were found.