{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:49Z","timestamp":1725551209025},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_24","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T06:30:40Z","timestamp":1270621840000},"page":"308-315","source":"Crossref","is-referenced-by-count":4,"title":["Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions"],"prefix":"10.1007","author":[{"given":"Ronald","family":"Kainda","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Flechais","sequence":"additional","affiliation":[]},{"given":"A. W.","family":"Roscoe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California (2002)"},{"key":"24_CR2","unstructured":"Feeney, L.M., Ahlgren, B., Westerlund, A.: Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment. In: International conference on pervasive computing, Pervasive 2002 (2002)"},{"key":"24_CR3","first-page":"1143","volume-title":"ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security","author":"R. Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Welch, M.: A human-verifiable authentication protocol using visible laser light. In: ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 1143\u20131148. IEEE Computer Society, Los Alamitos (2007)"},{"key":"24_CR4","first-page":"306","volume-title":"SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy","author":"N. Saxena","year":"2006","unstructured":"Saxena, N., Ekberg, J.E., Kostiainen, K., Asokan, N.: Secure Device Pairing based on a Visual Channel (Short Paper). In: SP 2006: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 306\u2013313. IEEE Computer Society, Los Alamitos (2006)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-72037-9_9","volume-title":"Pervasive Computing","author":"R. Mayrhofer","year":"2007","unstructured":"Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on Accelerometer Data. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 144\u2013161. Springer, Heidelberg (2007)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Saxena, N., Uddin, B., Jonathan, V.: Universal Device Pairing Using an Auxiliary Device. In: Symposium on Usable Privacy and Security (SOUPS) (July 2008)","DOI":"10.1145\/1408664.1408672"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Kainda, R., Flechais, I., Roscoe, A.: Usability and Security of Out-of-Band Channels in Secure Device Pairing Protocols. In: SOUPS 2009: Proceedings of the 5th symposium on Usable privacy and security (2009)","DOI":"10.1145\/1572532.1572547"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Kobsa, A., Sonawalla, R., Tsudik, G., Uzun, E., Wang, Y.: Serial Hook-ups: A Comparative Usability Study of Secure Device Pairing Methods. In: SOUPS 2009: Proceedings of the 5th symposium on Usable privacy and security (2009)","DOI":"10.1145\/1572532.1572546"},{"key":"24_CR9","unstructured":"Soriente, C., Tsudik, G., Uzun, E.: BEDA: Button-Enabled Device Association. In: International Workshop on Security for Spontaneous Interaction, IWSSI (2007)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Juola, P.: Whole-word Phonetic Distance and the PGPfone Alphabet. In: Proceedings of Fourth International Conference on Spoken Language, ICSLP 1996, October 1996, vol.\u00a01, pp. 98\u2013101 (1996)","DOI":"10.1109\/ICSLP.1996.607046"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Haller, N.M.: The S\/KEY one-time password system. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 151\u2013157 (1994)","DOI":"10.17487\/rfc1760"},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/10447319509526110","volume":"7","author":"J.R. Lewis","year":"1995","unstructured":"Lewis, J.R.: IBM Computer Usability Satisfaction Questionnaires: Psychometric Evaluation and Instructions for Use. Int. J. Hum. -Comput. Interact.\u00a07(1), 57\u201378 (1995)","journal-title":"Int. J. Hum. -Comput. Interact."}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:43:55Z","timestamp":1558993435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}