WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
That one there! Pointing to establish device identity
Proceedings of the 15th annual ACM symposium on User interface software and technology
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
People, places, things: Web presence for the real world
WMCSA '00 Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00)
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
In Search of Usable Security: Five Lessons from the Field
IEEE Security and Privacy
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Home networking and HCI: what hath god wrought?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
Serial hook-ups: a comparative usability study of secure device pairing methods
Proceedings of the 5th Symposium on Usable Privacy and Security
Adaptive Security Dialogs for Improved Security Behavior of Users
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
How smart homes learn: the evolution of the networked home and household
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
ICEbox: toward easy-to-use home networking
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Usability analysis of secure pairing methods
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Influence of user perception, security needs, and social factors on device pairing method choices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Eden: supporting home network management through interactive visual tools
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
Pairing devices for social interactions: a comparative usability evaluation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using a spatial context authentication proxy for establishing secure wireless connections
Journal of Mobile Multimedia
Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11, & VMIL'11
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Instant matchmaking: simple and secure integrated ubiquitous computing environments
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Ad hoc security associations for groups
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
FollowMe: enhancing mobile applications with open infrastructure sensing
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Towards a socially aware home router
Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research
MultiNet: reducing interaction overhead in domestic wireless networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.00 |
Combining effective security and usability is often considered impossible. For example, deploying effective security for wireless networks is a difficult task, even for skilled systems administrators - a fact that is impeding the deployment of many mobile systems. In this paper we describe a system that lets typical users easily build a highly secure wireless network. Our main contribution is to show how gesture-based user interfaces can be applied to provide a complete solution for securing wireless networks. This allows users to intuitively manage the network security of their mobile devices, even those with limited user interfaces. We demonstrate through user studies that our secure implementation is considerably easier to use than typical commercially available options, even those that provide lower security. Our gesture-based approach is quite general, and can be used to design a wide variety of systems that are simultaneously secure and easy to administer.