{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:49:43Z","timestamp":1755838183966,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T00:00:00Z","timestamp":1279065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,7,14]]},"DOI":"10.1145\/1837110.1837117","type":"proceedings-article","created":{"date-parts":[[2010,7,22]],"date-time":"2010-07-22T18:52:26Z","timestamp":1279824746000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Two heads are better than one"],"prefix":"10.1145","author":[{"given":"Ronald","family":"Kainda","sequence":"first","affiliation":[{"name":"Oxford University Computing Laboratory, UK"}]},{"given":"Ivan","family":"Flechais","sequence":"additional","affiliation":[{"name":"Oxford University Computing Laboratory, UK"}]},{"given":"A. W.","family":"Roscoe","sequence":"additional","affiliation":[{"name":"Oxford University Computing Laboratory, UK"}]}],"member":"320","published-online":{"date-parts":[[2010,7,14]]},"reference":[{"issue":"5799","key":"e_1_3_2_1_1_1","first-page":"610","volume":"314","author":"Anderson R.","year":"2006","unstructured":"R. Anderson and T. Moore . The Economics of Information Security. Science , 314 ( 5799 ): 610 -- 613 , 2006 . R. Anderson and T. Moore. The Economics of Information Security. Science, 314(5799):610--613, 2006.","journal-title":"The Economics of Information Security. Science"},{"key":"e_1_3_2_1_2_1","volume-title":"In Symposium on Network and Distributed Systems Security (NDSS '02)","author":"Balfanz D.","year":"2002","unstructured":"D. Balfanz , D. K. Smetters , P. Stewart , and H. C. Wong . Talking to strangers: Authentication in ad-hoc wireless networks . In In Symposium on Network and Distributed Systems Security (NDSS '02) , San Diego, California , 2002 . D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"key":"e_1_3_2_1_4_1","volume-title":"In Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU)","author":"Chong M. K.","year":"2010","unstructured":"M. K. Chong and H. Gellersen . Classification of spontaneous device association from a usability perspective . In In Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU) , 2010 . M. K. Chong and H. Gellersen. Classification of spontaneous device association from a usability perspective. In In Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU), 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073011"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"198","article-title":"On the Security of Public Key Protocols. In Information Theory","volume":"29","author":"Dolev D.","year":"1983","unstructured":"D. Dolev and A. Yao . On the Security of Public Key Protocols. In Information Theory , IEEE Transactions on , volume 29 ( 2 ), pages 198 -- 208 , 1983 . D. Dolev and A. Yao. On the Security of Public Key Protocols. In Information Theory, IEEE Transactions on, volume 29(2), pages 198--208, 1983.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_8_1","volume-title":"International conference on pervasive computing (Pervasive 2002)","author":"Feeney L. M.","year":"2002","unstructured":"L. M. Feeney , B. Ahlgren , and A. Westerlund . Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment . In International conference on pervasive computing (Pervasive 2002) , 2002 . L. M. Feeney, B. Ahlgren, and A. Westerlund. Demonstration abstract: Spontaneous networking for secure collaborative applications in an infrastructureless environment. In International conference on pervasive computing (Pervasive 2002), 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642636"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_11_1","unstructured":"B. S. I. Group. Simple Pairing White Paper. www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F\/0\/SimplePairing_WP_V10r00.pdf.  B. S. I. Group. Simple Pairing White Paper. www.bluetooth.com\/NR\/rdonlyres\/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F\/0\/SimplePairing_WP_V10r00.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837118"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572547"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_24"},{"key":"e_1_3_2_1_15_1","volume-title":"Secure Mobile Ad-hoc Interactions: Reasoning About Out-Of-Band (OOB) Channels. In In Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU)","author":"Kainda R.","year":"2010","unstructured":"R. Kainda , I. Flechais , and A. Roscoe . Secure Mobile Ad-hoc Interactions: Reasoning About Out-Of-Band (OOB) Channels. In In Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU) , 2010 . R. Kainda, I. Flechais, and A. Roscoe. Secure Mobile Ad-hoc Interactions: Reasoning About Out-Of-Band (OOB) Channels. In In Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU), 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"Security and Usability: Analysis and Evaluation","author":"Kainda R.","year":"2010","unstructured":"R. Kainda , I. Flechais , and A. Roscoe . Security and Usability: Analysis and Evaluation . 2010 . R. Kainda, I. Flechais, and A. Roscoe. Security and Usability: Analysis and Evaluation. 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00007-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447319509526110"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317829"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758168"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_24_1","first-page":"9","volume-title":"Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA)","author":"Nguyen L. H.","year":"2006","unstructured":"L. H. Nguyen and A. W. Roscoe . Efficient group authentication protocol based on human interaction . In Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA) , pages 9 -- 33 , 2006 . L. H. Nguyen and A. W. Roscoe. Efficient group authentication protocol based on human interaction. In Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA), pages 9--33, 2006."},{"key":"e_1_3_2_1_25_1","first-page":"131","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce (Cryp TEC '99)","author":"Perrig A.","year":"1999","unstructured":"A. Perrig and D. Song . Hash visualization: a new technique to improve real-world security . In International Workshop on Cryptographic Techniques and E-Commerce (Cryp TEC '99) , pages 131 -- 138 , 1999 . A. Perrig and D. Song. Hash visualization: a new technique to improve real-world security. In International Workshop on Cryptographic Techniques and E-Commerce (Cryp TEC '99), pages 131--138, 1999."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141362"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408672"},{"key":"e_1_3_2_1_30_1","article-title":"Truths and fictions","author":"Schneier B.","year":"1998","unstructured":"B. Schneier . Biometrics : Truths and fictions . Crypto-Gram Newsletter , August 15, 1998 . B. Schneier. Biometrics: Truths and fictions. Crypto-Gram Newsletter, August 15, 1998.","journal-title":"Crypto-Gram Newsletter"},{"key":"e_1_3_2_1_31_1","volume-title":"Digital Security in a Networked World","author":"Schneier B.","year":"2000","unstructured":"B. Schneier . Secrets &amp; Lies : Digital Security in a Networked World . John Wiley & amp; Sons, Inc., New York, NY, USA, 2000 . B. Schneier. Secrets &amp; Lies: Digital Security in a Networked World. John Wiley &amp; Sons, Inc., New York, NY, USA, 2000."},{"key":"e_1_3_2_1_32_1","volume-title":"BEDA: Button-Enabled Device Association. In In International Workshop on Security for Spontaneous Interaction (IWSSI)","author":"Soriente C.","year":"2007","unstructured":"C. Soriente , G. Tsudik , and E. Uzun . BEDA: Button-Enabled Device Association. In In International Workshop on Security for Spontaneous Interaction (IWSSI) , 2007 . C. Soriente, G. Tsudik, and E. Uzun. BEDA: Button-Enabled Device Association. In In International Workshop on Security for Spontaneous Interaction (IWSSI), 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_27"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012427"}],"event":{"name":"SOUPS '10: Symposium on Usable Privacy and Security","sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Redmond Washington USA","acronym":"SOUPS '10"},"container-title":["Proceedings of the Sixth Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1837110.1837117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:51Z","timestamp":1750246791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837117"}},"subtitle":["security and usability of device associations in group scenarios"],"short-title":[],"issued":{"date-parts":[[2010,7,14]]},"references-count":34,"alternative-id":["10.1145\/1837110.1837117","10.1145\/1837110"],"URL":"https:\/\/doi.org\/10.1145\/1837110.1837117","relation":{},"subject":[],"published":{"date-parts":[[2010,7,14]]},"assertion":[{"value":"2010-07-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}