That one there! Pointing to establish device identity
Proceedings of the 15th annual ACM symposium on User interface software and technology
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Point & Click - Interaction in Smart Environments
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Synchronous gestures for multiple persons and computers
Proceedings of the 16th annual ACM symposium on User interface software and technology
SyncTap: synchronous user operation for spontaneous network connection
Personal and Ubiquitous Computing
A gesture-based authentication scheme for untrusted public terminals
Proceedings of the 17th annual ACM symposium on User interface software and technology
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secure Device Pairing based on a Visual Channel (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
A Human-Verifiable Authentication Protocol Using Visible Laser Light
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Network-in-a-box: how to set up a secure wireless network in under a minute
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Universal device pairing using an auxiliary device
Proceedings of the 4th symposium on Usable privacy and security
HAPADEP: Human-Assisted Pure Audio Device Pairing
ISC '08 Proceedings of the 11th international conference on Information Security
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Using audio in secure device pairing
International Journal of Security and Networks
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
Touch & connect and touch & select: interacting with a computer by touching it with a mobile phone
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
A taxonomy for and analysis of multi-person-display ecosystems
Personal and Ubiquitous Computing
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
Influence of user perception, security needs, and social factors on device pairing method choices
Proceedings of the Sixth Symposium on Usable Privacy and Security
GesturePIN: using discrete gestures for associating mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
PhoneTouch: a technique for direct phone interaction on surfaces
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
EasyGroups: binding mobile devices for collaborative interactions
CHI '12 Extended Abstracts on Human Factors in Computing Systems
How groups of users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
NFC provided user friendliness for technologically advanced services
HCI International'13 Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction for health, safety, mobility and complex environments - Volume Part II
Hi-index | 0.00 |
As wireless devices increasingly becoming ubiquitous, spontaneous interaction opportunities are accordingly becoming common. Although spontaneous interaction research has been ongoing for many years, a key question of spontaneous interaction still remains open: how can users associate devices in a natural, intuitive and secure manner. Over the past decade, researchers have demonstrated a plethora of device association techniques. Nonetheless, users were often neglected during design or they were only involved in a later stage, like testing. We argue that since device association is performed by end-users, usability factors need to be considered in the early stage of design. In this article, we present a categorisation of factors that influence the usability of device association. This paper aims at providing a framework that informs researchers and system designers of the considerations needed when designing or adopting an association technique.