A Comparative Study to Evaluate the Usability of Context-Based Wi-Fi Access Mechanisms
暂无分享,去创建一个
Matthias Budde | Michael Beigl | Till Riedel | Marcel Köpke | Matthias Berning | M. Beigl | M. Köpke | M. Budde | T. Riedel | Matthias Berning
[1] Srdjan Capkun,et al. Influence of user perception, security needs, and social factors on device pairing method choices , 2010, SOUPS.
[2] Michael Hauber,et al. jActivity: supporting mobile web developers with HTML5/JavaScript based human activity recognition , 2013, MUM.
[3] Alessandro Puiatti,et al. Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services , 2013, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
[4] Gregory D. Abowd,et al. Ubicomp 2001: Ubiquitous Computing , 2001, Lecture Notes in Computer Science.
[5] It Informatics. Wi-Fi Protected Setup , 2012 .
[6] A. W. Roscoe,et al. Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.
[7] Andreas Holzinger,et al. HCI and Usability for Education and Work, 4th Symposium of the WG HCI&UE of the OCG Austrian Computer Society, USAB 2008, LNCS 5298 , 2008 .
[8] Patrick Brézillon,et al. Modeling and Using Context , 1999, Lecture Notes in Computer Science.
[9] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[10] J. B. Brooke,et al. SUS: A 'Quick and Dirty' Usability Scale , 1996 .
[11] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[12] Matthias Budde,et al. Point & control -- interaction in smart environments: you only click twice , 2013, UbiComp.
[13] Matthias Budde,et al. Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication , 2013, UbiComp.
[14] Martin Schrepp,et al. User Experience Questionnaire (UEQ) Benchmark. Praxiserfahrungen zur Auswertung und Anwendung von UEQ-Erhebungen im Business-Umfeld , 2013, UP.
[15] Virpi Roto,et al. Usable Access Control inside Home Networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[16] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[17] Srinivasan Seshan,et al. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries , 2009, Pervasive.
[18] Yusheng Ji,et al. PINtext: A Framework for Secure Communication Based on Context , 2011, MobiQuitous.
[19] Yusheng Ji,et al. Entropy of Audio Fingerprints for Unobtrusive Device Authentication , 2011, CONTEXT.
[20] Martin Schrepp,et al. Construction and Evaluation of a User Experience Questionnaire , 2008, USAB.
[21] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.
[22] TsudikGene,et al. A comparative study of secure device pairing methods , 2009 .
[23] Uwe Hansmann,et al. Pervasive Computing , 2003 .
[24] Daniel B. Faria,et al. No Long-term Secrets : Location-based Security in Overprovisioned Wireless LANs , 2004 .