Point&Connect: intention-based device pairing for mobile phone users
暂无分享,去创建一个
Songwu Lu | Guobin Shen | Chunyi Peng | Yongguang Zhang | G. Shen | Songwu Lu | Yongguang Zhang | Chunyi Peng
[1] Xenofon D. Koutsoukos,et al. Tracking mobile nodes using RF Doppler shifts , 2007, SenSys '07.
[2] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[3] Masanori Sugimoto,et al. Toss-it: intuitive information transfer techniques for mobile devices , 2005, CHI EA '05.
[4] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[5] N. Asokan,et al. Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] Claudio Soriente,et al. HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.
[7] Enrico Rukzio,et al. Physical mobile interactions : mobile devices as pervasive mediators for interactions with the real world , 2006 .
[8] Jun Rekimoto,et al. SyncTap: An Interaction Technique for Mobile Networking , 2003, Mobile HCI.
[9] Ersin Uzun,et al. Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.
[10] Paramvir Bahl,et al. Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks , 2004, MobiCom '04.
[11] Albrecht Schmidt,et al. An Experimental Comparison of Physical Mobile Interaction Techniques: Touching, Pointing and Scanning , 2006, UbiComp.
[12] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[13] René Mayrhofer,et al. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction , 2007, UbiComp.
[14] J. Edward Swan,et al. Toward Disambiguating Multiple Selections for Frustum-Based Pointing , 2006, 3D User Interfaces (3DUI'06).
[15] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[16] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[17] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[18] Rainer Stiefelhagen,et al. Visual recognition of pointing gestures for human-robot interaction , 2007, Image Vis. Comput..
[19] Darko Kirovski,et al. The Martini Synch: Device Pairing via Joint Quantization , 2007, 2007 IEEE International Symposium on Information Theory.
[20] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[21] Cristina Videira Lopes,et al. Aerial acoustic communications , 2001, Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575).
[22] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[23] Guobin Shen,et al. BeepBeep: a high accuracy acoustic ranging system using COTS mobile devices , 2007, SenSys '07.
[24] Nitesh Saxena,et al. Universal device pairing using an auxiliary device , 2008, SOUPS '08.
[25] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[26] Nitesh Saxena,et al. Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns , 2008, ACNS.
[27] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[28] Ken Hinckley,et al. Synchronous gestures for multiple persons and computers , 2003, UIST '03.
[29] Robert Tappan Morris,et al. Persistent personal names for globally connected mobile devices , 2006, OSDI '06.