Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Serial hook-ups: a comparative usability study of secure device pairing methods
Proceedings of the 5th Symposium on Usable Privacy and Security
Usability and security of out-of-band channels in secure device pairing protocols
Proceedings of the 5th Symposium on Usable Privacy and Security
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Influence of user perception, security needs, and social factors on device pairing method choices
Proceedings of the Sixth Symposium on Usable Privacy and Security
How users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Entropy of audio fingerprints for unobtrusive device authentication
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
Point & control -- interaction in smart environments: you only click twice
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Hi-index | 0.00 |
This paper proposes using a 2D waveguide for a novel means of authentication in public Wi-Fi infrastructures. The design of the system is presented, and its practicability and usability is comparatively discussed with that of five other tag and context based authentication schemes, two of which have not been previously realized. In accordance with the presented application scenarios, all of the schemes were implemented in a platform-independent fashion built on web technology.