{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:15:25Z","timestamp":1771870525566,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,22]],"date-time":"2009-06-22T00:00:00Z","timestamp":1245628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,22]]},"DOI":"10.1145\/1555816.1555831","type":"proceedings-article","created":{"date-parts":[[2009,6,24]],"date-time":"2009-06-24T21:59:19Z","timestamp":1245880759000},"page":"137-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Point&amp;Connect"],"prefix":"10.1145","author":[{"given":"Chunyi","family":"Peng","sequence":"first","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Guobin","family":"Shen","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Yongguang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"]]Bluetooth simple pairing. http:\/\/www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F%70F\/0\/SimplePairing_WP_V10r00.pdf.  ]]Bluetooth simple pairing. http:\/\/www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F%70F\/0\/SimplePairing_WP_V10r00.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"]]QR code. http:\/\/www.nttdocomo.co.jp\/english\/service\/imode\/make\/content\/barcode\/t%ool\/.  ]]QR code. http:\/\/www.nttdocomo.co.jp\/english\/service\/imode\/make\/content\/barcode\/t%ool\/."},{"key":"e_1_3_2_1_3_1","unstructured":"]]Semacode. http:\/\/semacode.com\/.  ]]Semacode. http:\/\/semacode.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"]]WiFi Protected Setup. http:\/\/www.wi-fi.org\/wifi-protected-setup.  ]]WiFi Protected Setup. http:\/\/www.wi-fi.org\/wifi-protected-setup."},{"key":"e_1_3_2_1_5_1","unstructured":"]]Windows Connect Now Technology. http:\/\/www.microsoft.com\/windowsxp\/using\/networking\/getstarted\/windowsconnectnow.mspx.  ]]Windows Connect Now Technology. http:\/\/www.microsoft.com\/windowsxp\/using\/networking\/getstarted\/windowsconnectnow.mspx."},{"key":"e_1_3_2_1_6_1","unstructured":"]]Wireless USB Association Models. http:\/\/www.usb.org\/developers\/wusb\/.  ]]Wireless USB Association Models. http:\/\/www.usb.org\/developers\/wusb\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023724"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02)","author":"Balfanz D.","year":"2002","unstructured":"]] D. Balfanz , D. K. Smetters , P. Stewart , and H. C. Wong . Talking to strangers: Authentication in ad-hoc wireless networks . In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02) , San Diego, CA , February 2002 . ]]D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02), San Diego, CA, February 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298478"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/964696.964713"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741340"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557269"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322267"},{"key":"e_1_3_2_1_15_1","volume-title":"Lopes and P. M. Q. Aguiar. Aerial Acoustic Communications. In Proceedings of the 2001 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics","author":"C.","year":"2001","unstructured":"]] C. V. Lopes and P. M. Q. Aguiar. Aerial Acoustic Communications. In Proceedings of the 2001 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics , New Paltz, NY , 2001 . ]]C. V. Lopes and P. M. Q. Aguiar. Aerial Acoustic Communications. In Proceedings of the 2001 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, New Paltz, NY, 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"]]\n      R.\n      Mayrhofer\n     and \n      H.\n      Gellersen\n  . \n  Shake well before use: Authentication based on accelerometer data\n  . In A. LaMarca M. Langheinrich and K. N. Truong editors Pervasive volume \n  4480\n   of \n  Lecture Notes in Computer Science pages \n  144\n  --\n  161\n  . \n  Springer 2007\n  .   ]]R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. In A. LaMarca M. Langheinrich and K. N. Truong editors Pervasive volume 4480 of Lecture Notes in Computer Science pages 144--161. Springer 2007.","DOI":"10.1007\/978-3-540-72037-9_9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771604"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2005.12.020"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322265"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"]]\n      R.\n      Prasad\n     and \n      N.\n      Saxena\n  . \n  Efficient device pairing using \"human-comparable\"synchronized audiovisual patterns\n  . In S. M. Bellovin R. Gennaro A. D. Keromytis and M. Yung editors ACNS volume \n  5037\n   of \n  Lecture Notes in Computer Science pages \n  328\n  --\n  345 2008\n  .   ]]R. Prasad and N. Saxena. Efficient device pairing using \"human-comparable\"synchronized audiovisual patterns. In S. M. Bellovin R. Gennaro A. D. Keromytis and M. Yung editors ACNS volume 5037 of Lecture Notes in Computer Science pages 328--345 2008.","DOI":"10.1007\/978-3-540-68914-0_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45233-1_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408672"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2006.133"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"e_1_3_2_1_29_1","unstructured":"]]E. Uzun K. Karvonen and N. Asokan. Usability analysis of secure pairing methods. http:\/\/research.nokia.com\/files\/NRC-TR-2007-002.pdf 2007.  ]]E. Uzun K. Karvonen and N. Asokan. Usability analysis of secure pairing methods. http:\/\/research.nokia.com\/files\/NRC-TR-2007-002.pdf 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771607"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057046"}],"event":{"name":"Mobisys '09: The 7th International Conference on Mobile Systems, Applications, and Services","location":"Krak\u00f3w Poland","acronym":"Mobisys '09","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1555816.1555831","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1555816.1555831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:45Z","timestamp":1750253925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1555816.1555831"}},"subtitle":["intention-based device pairing for mobile phone users"],"short-title":[],"issued":{"date-parts":[[2009,6,22]]},"references-count":30,"alternative-id":["10.1145\/1555816.1555831","10.1145\/1555816"],"URL":"https:\/\/doi.org\/10.1145\/1555816.1555831","relation":{},"subject":[],"published":{"date-parts":[[2009,6,22]]},"assertion":[{"value":"2009-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}