{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T15:46:32Z","timestamp":1696434392311},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,7,2]],"date-time":"2011-07-02T00:00:00Z","timestamp":1309564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1007\/s00779-011-0421-1","type":"journal-article","created":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T03:37:00Z","timestamp":1309491420000},"page":"77-89","source":"Crossref","is-referenced-by-count":26,"title":["Usability classification for spontaneous device association"],"prefix":"10.1007","volume":"16","author":[{"given":"Ming Ki","family":"Chong","sequence":"first","affiliation":[]},{"given":"Hans","family":"Gellersen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,2]]},"reference":[{"key":"421_CR1","unstructured":"Balfanz D, Durfee G, Grinter RE, Smetters DK, Stewart P (2004) Network-in-a-box: how to set up a secure wireless network in under a minute. In: SSYM\u201904: Proceedings of the 13th conference on USENIX security symposium, USENIX Association, pp 207\u2013222"},{"key":"421_CR2","unstructured":"Balfanz D, Smetters D, Stewart P, Wong HC (2002) Talking to strangers: authentication in ad-hoc wireless networks. In: NDSS\u201902: Proceedings of the 2002 network and distributed systems security symposium"},{"key":"421_CR3","doi-asserted-by":"crossref","unstructured":"Beigl M (1999) Point & Click-interaction in smart environments. In: HUC \u201999: Proceedings of the 1st international symposium on handheld and ubiquitous computing. Springer, pp 311\u2013313","DOI":"10.1007\/3-540-48157-5_31"},{"key":"421_CR4","doi-asserted-by":"crossref","unstructured":"Bichler D, Stromberg G, Huemer M, L\u00f6w M (2007) Key generation based on acceleration data of shaking processes. In: UbiComp 2007: ubiquitous computing. Springer, pp 304\u2013317","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"421_CR5","unstructured":"Bluetooth Special Interest Group (2006) Simple pairing whitepaper (revision v10r00)"},{"issue":"1\/2","key":"421_CR6","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1504\/IJSN.2009.023424","volume":"4","author":"I Buhan","year":"2009","unstructured":"Buhan I, Boom B, Doumen J, Hartel PH, Veldhuis RNJ (2009) Secure pairing with biometrics. Int J Secur Netw 4(1\/2): 27\u201342","journal-title":"Int J Secur Netw"},{"key":"421_CR7","doi-asserted-by":"crossref","unstructured":"Castelluccia C, Mutaf P (2005) Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In: MobiSys \u201905: Proceedings of the 3rd international conference on mobile systems, applications, and services, ACM, pp 51\u201364","DOI":"10.1145\/1067170.1067177"},{"key":"421_CR8","unstructured":"Chong MK, Gellersen H (2010) Classification of spontaneous device association from a usability perspective. In: IWSSI\/SPMU 2010, pp 1\u20137"},{"key":"421_CR9","doi-asserted-by":"crossref","unstructured":"Chong MK, Marsden G, Gellersen H (2010) GesturePIN: using discrete gestures for associating mobile devices. In: MobileHCI 2010","DOI":"10.1145\/1851600.1851644"},{"issue":"6","key":"421_CR10","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1037\/h0055392","volume":"47","author":"PM Fitts","year":"1954","unstructured":"Fitts PM (1954) The information capacity of the human motor system in controlling the amplitude of movement. J Exp Psychol 47(6):381\u2013391","journal-title":"J Exp Psychol"},{"issue":"1","key":"421_CR11","first-page":"29","volume":"7","author":"C Gehrmann","year":"2004","unstructured":"Gehrmann C, Mitchell CJ, Nyberg K (2004) Manual authentication for wireless devices. RSA CryptoBytes 7(1):29\u201337","journal-title":"RSA CryptoBytes"},{"issue":"1\/2","key":"421_CR12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1504\/IJSN.2009.023426","volume":"4","author":"MT Goodrich","year":"2009","unstructured":"Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E (2009) Using audio in secure device pairing. Int J Secur Netw 4(1\/2):57\u201368","journal-title":"Int J Secur Netw"},{"key":"421_CR13","doi-asserted-by":"crossref","unstructured":"Goodrich MT, Sirivianos M, Solis J, Tsudik G, Uzun E (2006) Loud and Clear: Human-verifiable authentication based on audio. In: ICDCS \u201906: Proceedings of the 26th IEEE international conference on distributed computing systems, IEEE Computer Society, p 10.","DOI":"10.1109\/ICDCS.2006.52"},{"key":"421_CR14","doi-asserted-by":"crossref","unstructured":"Hinckley K (2003) Synchronous gestures for multiple persons and computers. In: UIST \u201903: Proceedings of the 16th annual ACM symposium on user interface software and technology. ACM, pp 149\u2013158","DOI":"10.1145\/964696.964713"},{"key":"421_CR15","doi-asserted-by":"crossref","unstructured":"Holmquist LE, Mattern F, Schiele B, Alahuhta P, Beigl M, Gellersen H-W (2001) Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: UbiComp \u201901: Proceedings of the 3rd international conference on ubiquitous computing. Springer, pp 116\u2013122","DOI":"10.1007\/3-540-45427-6_10"},{"key":"421_CR16","doi-asserted-by":"crossref","unstructured":"Ion I, Langheinrich M, Kumaraguru P, Capkun S (2010) Influence of user perception, security needs, and social factors on device pairing method choices. In: SOUPS \u201910","DOI":"10.1145\/1837110.1837118"},{"key":"421_CR17","doi-asserted-by":"crossref","unstructured":"Iwasaki Y, Kawaguchi N, Inagaki Y (2003) Touch-and-connect: a connection request framework for ad-hoc networks and the pervasive computing environment. In: PERCOM \u201903: Proceedings of the first IEEE international conference on pervasive computing and communications, IEEE Computer Society, pp 20\u201329","DOI":"10.1109\/PERCOM.2003.1192723"},{"key":"421_CR18","unstructured":"Kainda R, Flechais I, Roscoe AW (2010) Secure mobile ad-hoc interactions: reasoning about out-of-band (oob) channels. In: IWSSI\/SPMU 2010, pp 10\u201315"},{"key":"421_CR19","doi-asserted-by":"crossref","unstructured":"Kainda R, Flechais I, Roscoe AW (2010) Two heads are better than one: security and usability of device associations in group scenarios. In: Proceedings of SOUPS 2010. ACM Press","DOI":"10.1145\/1837110.1837117"},{"key":"421_CR20","doi-asserted-by":"crossref","unstructured":"Kindberg T, Zhang K (2003) Secure spontaneous device association. In: UbiComp 2003: ubiquitous computing. Springer, pp 124\u2013131","DOI":"10.1007\/978-3-540-39653-6_9"},{"key":"421_CR21","doi-asserted-by":"crossref","unstructured":"Kindberg T, Zhang K (2003) Validating and securing spontaneous associations between wireless devices. In: ISC 2003: information security. Springer, pp 44\u201353","DOI":"10.1007\/10958513_4"},{"key":"421_CR22","doi-asserted-by":"crossref","unstructured":"Laur S, Nyberg K (2006) Efficient mutual data authentication using manually authenticated strings. In: Cryptology and network security, Springer, pp 90\u2013107","DOI":"10.1007\/11935070_6"},{"issue":"6","key":"421_CR23","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1109\/TMC.2009.51","volume":"8","author":"R Mayrhofer","year":"2009","unstructured":"Mayrhofer R, Gellersen H (2009) Shake well before use: intuitive and secure pairing of mobile devices. IEEE Trans Mobile Comput 8(6):792\u2013806","journal-title":"IEEE Trans Mobile Comput"},{"key":"421_CR24","doi-asserted-by":"crossref","unstructured":"Mayrhofer R, Gellersen H, Hazas M (2007) Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction. In: UbiComp 2007: ubiquitous computing, Springer, pp 199\u2013216","DOI":"10.1007\/978-3-540-74853-3_12"},{"key":"421_CR25","doi-asserted-by":"crossref","unstructured":"Mayrhofer R, Welch M (2007) A human-verifiable authentication protocol using visible laser light. In: ARES \u201907: Proceedings of the second international conference on availability, reliability and security, IEEE Computer Society, pp 1143\u20131148","DOI":"10.1109\/ARES.2007.5"},{"key":"421_CR26","doi-asserted-by":"crossref","unstructured":"McCune JM, Perrig A, Reiter MK (2005) Seeing-Is-believing: using camera phones for human-verifiable authentication. In: SP \u201905: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, pp 110\u2013124","DOI":"10.1109\/SP.2005.19"},{"key":"421_CR27","doi-asserted-by":"crossref","unstructured":"Nicholson AJ, Smith IE, Hughes J, Noble BD (2006) LoKey: Leveraging the sms network in decentralized, end-to-end trust establishment. In: Pervasive computing. Springer, pp 202\u2013219","DOI":"10.1007\/11748625_13"},{"key":"421_CR28","doi-asserted-by":"crossref","unstructured":"Park DG, Kim JK, Sung JB, Hwang JH, Hyung CH, Kang SW (2006) TAP: Touch-And-Play. In: CHI \u201906: Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, pp 677\u2013680","DOI":"10.1145\/1124772.1124873"},{"key":"421_CR29","doi-asserted-by":"crossref","unstructured":"Patel SN, Pierce JS, Abowd GD (2004) A gesture-based authentication scheme for untrusted public terminals. In: UIST \u201904: Proceedings of the 17th annual ACM symposium on user interface software and technology. ACM, pp 157\u2013160","DOI":"10.1145\/1029632.1029658"},{"issue":"2","key":"421_CR30","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/s00779-004-0262-2","volume":"8","author":"J Rekimoto","year":"2004","unstructured":"Rekimoto J (2004) SyncTap: synchronous user operation for spontaneous network connection. Pers Ubiquit Comput 8(2):126\u2013134","journal-title":"Pers Ubiquit Comput"},{"key":"421_CR31","unstructured":"Rekimoto J, Ayatsuka Y, Kohno M, Oba H (2003) Proximal interactions: a direct manipulation technique for wireless networking. In: INTERACT \u201903, IOS Press, pp 511\u2013518"},{"key":"421_CR32","unstructured":"Saxena N, Ekberg J-E, Kostiainen K, Asokan N (2006) Secure device pairing based on a visual channel (short paper). In: SP \u201906: Proceedings of the 2006 IEEE symposium on security and privacy, IEEE Computer Society, pp 306\u2013313"},{"key":"421_CR33","doi-asserted-by":"crossref","unstructured":"Saxena N, Uddin MB, Voris J (2008) Universal device pairing using an auxiliary device. In: SOUPS \u201908: Proceedings of the 4th symposium on usable privacy and security, ACM, pp 56\u201367","DOI":"10.1145\/1408664.1408672"},{"key":"421_CR34","doi-asserted-by":"crossref","unstructured":"Schmidt D, Chehimi F, Rukzio E, Gellersen H (2010) Phonetouch: a technique for direct phone interaction on surfaces. In: UIST \u201910: Proceedings of the 23nd annual ACM symposium on user interface software and technology. ACM, pp 13\u201316","DOI":"10.1145\/1866029.1866034"},{"key":"421_CR35","doi-asserted-by":"crossref","unstructured":"Seewoonauth K, Rukzio E, Hardy R, Holleis P (2009) Touch & connect and touch & select: interacting with a computer by touching it with a mobile phone. In: MobileHCI \u201909: Proceedings of the 11th international conference on human-computer interaction with mobile devices and services. ACM, pp 36:1\u201336:9","DOI":"10.1145\/1613858.1613905"},{"key":"421_CR36","doi-asserted-by":"crossref","unstructured":"Soriente C, Tsudik G, Uzun E (2008) HAPADEP: Human-assisted pure audio device pairing. In: ISC \u201908: Proceedings of the 11th international conference on information security. Springer, pp 385\u2013400","DOI":"10.1007\/978-3-540-85886-7_27"},{"issue":"1\/2","key":"421_CR37","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1504\/IJSN.2009.023423","volume":"4","author":"C Soriente","year":"2009","unstructured":"Soriente C, Tsudik G, Uzun E (2009) Secure pairing of interface constrained devices. Int J Secur Netw 4(1\/2):17\u201326","journal-title":"Int J Secur Netw"},{"key":"421_CR38","unstructured":"Stajano F, Anderson R (1999) The resurrecting duckling: security issues for ad-hoc wireless networks. In: Proceedings of the 7th international workshop on security protocols. Springer, pp 172\u2013194"},{"issue":"1\/2","key":"421_CR39","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1504\/IJSN.2009.023428","volume":"4","author":"J Suomalainen","year":"2009","unstructured":"Suomalainen J, Valkonen J, Asokan N (2009) Standards for security associations in personal networks: a comparative analysis. Int J Secur Netw 4(1\/2):87\u2013100","journal-title":"Int J Secur Netw"},{"key":"421_CR40","doi-asserted-by":"crossref","unstructured":"Swindells C, Inkpen KM, Dill JC, Tory M (2002) That one there! pointing to establish device identity. In: UIST \u201902: Proceedings of the 15th annual ACM symposium on user interface software and technology. ACM, pp 151\u2013160","DOI":"10.1145\/571985.572007"},{"issue":"8","key":"421_CR41","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1007\/s00779-009-0244-5","volume":"13","author":"L Terrenghi","year":"2009","unstructured":"Terrenghi L, Quigley A, Dix A (2009) A taxonomy for and analysis of multi-person-display ecosystems. Pers Ubiquit Comput 13(8):583\u2013598","journal-title":"Pers Ubiquit Comput"},{"key":"421_CR42","doi-asserted-by":"crossref","unstructured":"Varshavsky A, Scannell A, LaMarca A, de Lara E (2007) Amigo: proximity-based authentication of mobile devices. In: UbiComp 2007: ubiquitous computing. Springer, pp 253\u2013270","DOI":"10.1007\/978-3-540-74853-3_15"},{"key":"421_CR43","doi-asserted-by":"crossref","unstructured":"Vaudenay S (2005) Secure communications over insecure channels based on short authenticated strings. In: CRYPTO 2005. Springer, Heidelberg, pp 309\u2013326","DOI":"10.1007\/11535218_19"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0421-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0421-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0421-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T16:00:05Z","timestamp":1560355205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0421-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,2]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["421"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0421-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,2]]}}}