{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:09Z","timestamp":1763467929008,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,15]],"date-time":"2009-07-15T00:00:00Z","timestamp":1247616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,15]]},"DOI":"10.1145\/1572532.1572547","type":"proceedings-article","created":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T12:45:28Z","timestamp":1248785128000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["Usability and security of out-of-band channels in secure device pairing protocols"],"prefix":"10.1145","author":[{"given":"Ronald","family":"Kainda","sequence":"first","affiliation":[{"name":"Oxford University Computing Laboratory, UK"}]},{"given":"Ivan","family":"Flechais","sequence":"additional","affiliation":[{"name":"Oxford University Computing Laboratory, UK"}]},{"given":"A. W.","family":"Roscoe","sequence":"additional","affiliation":[{"name":"Oxford University Computing Laboratory, UK"}]}],"member":"320","published-online":{"date-parts":[[2009,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168615"},{"key":"e_1_3_2_1_2_1","volume-title":"In Symposium on Network and Distributed Systems Security (NDSS '02)","author":"Balfanz D.","year":"2002","unstructured":"]] D. Balfanz , D. K. Smetters , P. Stewart , and H. C. Wong . Talking to strangers: Authentication in ad-hoc wireless networks . In In Symposium on Network and Distributed Systems Security (NDSS '02) , San Diego, California , 2002 . ]]D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"198","article-title":"On the security of public key protocols. In Information Theory","volume":"29","author":"Dolev D.","year":"1983","unstructured":"]] D. Dolev and A. Yao . On the security of public key protocols. In Information Theory , IEEE Transactions on , volume 29 ( 2 ), pages 198 -- 208 , 1983 . ]]D. Dolev and A. Yao. On the security of public key protocols. In Information Theory, IEEE Transactions on, volume 29(2), pages 198--208, 1983.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_7_1","volume-title":"RSA Cryptobytes","volume":"37","author":"Gehrmann C.","year":"2004","unstructured":"]] C. Gehrmann , C. J. Mitchell , and K. Nyberg . Manual authentication for wireless devices . In RSA Cryptobytes , volume 7(1), pages 29-- 37 . RSA Security , Spring 2004 . ]]C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. In RSA Cryptobytes, volume 7(1), pages 29--37. RSA Security, Spring 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_9_1","unstructured":"]]B. S. I. Group. Simple pairing white paper. www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F\/0\/SimplePairing_WP_V10r00.pdf.  ]]B. S. I. Group. Simple pairing white paper. www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F\/0\/SimplePairing_WP_V10r00.pdf."},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","volume-title":"Security weaknesses in bluetooth","author":"Jakobsson M.","year":"2001","unstructured":"]] M. Jakobsson and S. Wetzel . Security weaknesses in bluetooth . In Lecture Notes in Computer Science , volume 2020 , pages 176+, 2001 . ]]M. Jakobsson and S. Wetzel. Security weaknesses in bluetooth. In Lecture Notes in Computer Science, volume 2020, pages 176+, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2004.1375935"},{"key":"e_1_3_2_1_12_1","volume-title":"In Proceeding of the Human Computer Interaction International Conference HCII 2005","author":"Jeff S.","year":"2005","unstructured":"]] S. Jeff . and E. Kindlund . How long should a task take? identifying specification limits for task times in usability tests . In In Proceeding of the Human Computer Interaction International Conference HCII 2005 ), Las Vegas , 2005 . ]]S. Jeff. and E. Kindlund. How long should a task take? identifying specification limits for task times in usability tests. In In Proceeding of the Human Computer Interaction International Conference HCII 2005), Las Vegas, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447319509526110"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_16_1","volume-title":"Annual Meeting of the Southwest Educational Research Association","author":"Minke A.","year":"1997","unstructured":"]] A. Minke . Conducting repeated measures analyses: Experimental design considerations. Technical report , Annual Meeting of the Southwest Educational Research Association ( Austin, TX, January 23--25 , 1997 ), 1997. ]]A. Minke. Conducting repeated measures analyses: Experimental design considerations. Technical report, Annual Meeting of the Southwest Educational Research Association (Austin, TX, January 23--25, 1997), 1997."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_3_2_1_18_1","first-page":"9","volume-title":"Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA)","author":"Nguyen L. H.","year":"2006","unstructured":"]] L. H. Nguyen and A. W. Roscoe . Efficient group authentication protocol based on human interaction . In Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA) , pages 9 -- 33 , 2006 . ]]L. H. Nguyen and A. W. Roscoe. Efficient group authentication protocol based on human interaction. In Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA), pages 9--33, 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/175276.175282"},{"key":"e_1_3_2_1_21_1","unstructured":"]]Owen. Zxing: Multi-format 1d\/2d barcode image processing library with clients for android java and iphone project: http:\/\/code.google.com\/p\/zxing\/.  ]]Owen. Zxing: Multi-format 1d\/2d barcode image processing library with clients for android java and iphone project: http:\/\/code.google.com\/p\/zxing\/."},{"key":"e_1_3_2_1_22_1","first-page":"131","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)","author":"Perrig A.","year":"1999","unstructured":"]] A. Perrig and D. Song . Hash visualization: a new technique to improve real-world security . In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) , pages 131 -- 138 , 1999 . ]]A. Perrig and D. Song. Hash visualization: a new technique to improve real-world security. In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99), pages 131--138, 1999."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055028"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_26_1","article-title":"Truths and fictions","author":"Schneier B.","year":"1998","unstructured":"]] B. Schneier . Biometrics : Truths and fictions . Crypto-Gram Newsletter , August 15, 1998 . ]]B. Schneier. Biometrics: Truths and fictions. Crypto-Gram Newsletter, August 15, 1998.","journal-title":"Crypto-Gram Newsletter"},{"key":"e_1_3_2_1_27_1","volume-title":"Security in the real-world: How to evaluate security technology","author":"Schneier B.","year":"1999","unstructured":"]] B. Schneier . Security in the real-world: How to evaluate security technology , 1999 . ]]B. Schneier. Security in the real-world: How to evaluate security technology, 1999."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012427"},{"key":"e_1_3_2_1_29_1","unstructured":"]]I. Standards. Qrcode standard: Iso\/iec18004.  ]]I. Standards. Qrcode standard: Iso\/iec18004."},{"key":"e_1_3_2_1_30_1","unstructured":"]]S. Systems. Midp specification: http:\/\/java.sun.com\/products\/midp\/.  ]]S. Systems. Midp specification: http:\/\/java.sun.com\/products\/midp\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785635"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_19"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508195"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 8th USENIX Security Symposium","author":"Whitten A.","year":"1999","unstructured":"]] A. Whitten and J. Tygar . Why johnny can't encrypt: A usability evaluation of pgp 5.0 . In Proceedings of the 8th USENIX Security Symposium , August 1999 , Washington, pages 169--183 , 1999. ]]A. Whitten and J. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th USENIX Security Symposium, August 1999, Washington, pages 169--183, 1999."}],"event":{"name":"SOUPS '09: Symposium on Usable Privacy and Security","sponsor":["Carnegie Mellon CyLab","Google Inc.","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Mountain View California USA","acronym":"SOUPS '09"},"container-title":["Proceedings of the 5th Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1572532.1572547","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1572532.1572547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:29Z","timestamp":1750249409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1572532.1572547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,15]]},"references-count":33,"alternative-id":["10.1145\/1572532.1572547","10.1145\/1572532"],"URL":"https:\/\/doi.org\/10.1145\/1572532.1572547","relation":{},"subject":[],"published":{"date-parts":[[2009,7,15]]},"assertion":[{"value":"2009-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}