{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:11Z","timestamp":1763467991632,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T00:00:00Z","timestamp":1279065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,7,14]]},"DOI":"10.1145\/1837110.1837118","type":"proceedings-article","created":{"date-parts":[[2010,7,22]],"date-time":"2010-07-22T18:52:26Z","timestamp":1279824746000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Influence of user perception, security needs, and social factors on device pairing method choices"],"prefix":"10.1145","author":[{"given":"Iulia","family":"Ion","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Marc","family":"Langheinrich","sequence":"additional","affiliation":[{"name":"University of Lugano (USI), Lugano, Switzerland"}]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[{"name":"IIIT Delhi, New Delhi, India"}]},{"given":"Srdjan","family":"\u010capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2010,7,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bump. http:\/\/bu.mp\/.  Bump. http:\/\/bu.mp\/."},{"key":"e_1_3_2_1_2_1","first-page":"366","volume-title":"GI Jahrestagung (2)","author":"Adelmann R.","year":"2006","unstructured":"R. Adelmann , M. Langheinrich , and C. Floerkemeier . Toolkit for bar code recognition and resolving on camera phones -- jump starting the internet of things . In GI Jahrestagung (2) , pages 366 -- 373 , 2006 . R. Adelmann, M. Langheinrich, and C. Floerkemeier. Toolkit for bar code recognition and resolving on camera phones -- jump starting the internet of things. In GI Jahrestagung (2), pages 366--373, 2006."},{"key":"e_1_3_2_1_3_1","first-page":"15","volume-title":"SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium","author":"Balfanz D.","year":"2004","unstructured":"D. Balfanz , G. Durfee , R. E. Grinter , D. K. Smetters , and P. Stewart . Network-in-a-box: how to set up a secure wireless network in under a minute . In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium , pages 15 -- 15 , Berkeley, CA, USA , 2004 . USENIX Association. D. Balfanz, G. Durfee, R. E. Grinter, D. K. Smetters, and P. Stewart. Network-in-a-box: how to set up a secure wireless network in under a minute. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 15--15, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280689"},{"key":"e_1_3_2_1_5_1","volume-title":"Bluetooth Special Interest Group. Simple Pairing Whitepaper (Revision V10r00)","author":"SIG.","year":"2006","unstructured":"Bluetooth SIG. Bluetooth Special Interest Group. Simple Pairing Whitepaper (Revision V10r00) , 2006 . Bluetooth SIG. Bluetooth Special Interest Group. Simple Pairing Whitepaper (Revision V10r00), 2006."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"Drimer S.","year":"2007","unstructured":"S. Drimer and S. J. Murdoch . Keep your enemies close: distance bounding against smartcard relay attacks . In SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium , pages 1 -- 16 , Berkeley, CA, USA , 2007 . USENIX Association. S. Drimer and S. J. Murdoch. Keep your enemies close: distance bounding against smartcard relay attacks. In SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1--16, Berkeley, CA, USA, 2007. USENIX Association."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Nordsec 2001","author":"Gehrmann C.","year":"2001","unstructured":"C. Gehrmann and K. Nyberg . Enhancements to Bluetooth baseband security . In Proceedings of Nordsec 2001 , 2001 . C. Gehrmann and K. Nyberg. Enhancements to Bluetooth baseband security. In Proceedings of Nordsec 2001, 2001."},{"key":"e_1_3_2_1_8_1","first-page":"2004","article-title":"Manual authentication for wireless devices","volume":"7","author":"Gehrmann C.","year":"2004","unstructured":"C. Gehrmann and K. Nyberg . Manual authentication for wireless devices . RSA Cryptobytes , 7 : 2004 , 2004 . C. Gehrmann and K. Nyberg. Manual authentication for wireless devices. RSA Cryptobytes, 7:2004, 2004.","journal-title":"RSA Cryptobytes"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572547"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837117"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572546"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912753"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"key":"e_1_3_2_1_15_1","volume-title":"Alice meets bob: A comparative usability study of wireless device pairing methods for a \"two-user\" setting. CoRR, abs\/0907.4743","author":"Kumar A.","year":"2009","unstructured":"A. Kumar , N. Saxena , and E. Uzun . Alice meets bob: A comparative usability study of wireless device pairing methods for a \"two-user\" setting. CoRR, abs\/0907.4743 , 2009 . A. Kumar, N. Saxena, and E. Uzun. Alice meets bob: A comparative usability study of wireless device pairing methods for a \"two-user\" setting. CoRR, abs\/0907.4743, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935070_6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02806-9_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0262-2"},{"key":"e_1_3_2_1_20_1","first-page":"443","volume-title":"Proc. IWSSI 2007","author":"Soriente C.","year":"2007","unstructured":"C. Soriente , G. Tsudik , and E. Uzun . BEDA: Button-enabled device pairing . In Proc. IWSSI 2007 , pages 443 -- 449 , September 2007 . C. Soriente, G. Tsudik, and E. Uzun. BEDA: Button-enabled device pairing. In Proc. IWSSI 2007, pages 443--449, September 2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784404.1784409"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785635"},{"key":"e_1_3_2_1_24_1","first-page":"457","volume-title":"Proc. IWSSI 2007","author":"Valkonen J.","year":"2007","unstructured":"J. Valkonen , A. Toivonen , and K. Karvonen . Usability testing for secure device pairing in home networks . In Proc. IWSSI 2007 , pages 457 -- 462 , September 2007 . J. Valkonen, A. Toivonen, and K. Karvonen. Usability testing for secure device pairing in home networks. In Proc. IWSSI 2007, pages 457--462, September 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"volume-title":"October 14, 2009.","key":"e_1_3_2_1_26_1","unstructured":"Wi-fi. Wi-fi alliance announces groundbreaking specification to support direct wi-fi connections between devices. http:\/\/www.wi-fi.org\/news_articles.php?f=media_news&news_id=909 , October 14, 2009. Wi-fi. Wi-fi alliance announces groundbreaking specification to support direct wi-fi connections between devices. http:\/\/www.wi-fi.org\/news_articles.php?f=media_news&news_id=909, October 14, 2009."}],"event":{"name":"SOUPS '10: Symposium on Usable Privacy and Security","sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Redmond Washington USA","acronym":"SOUPS '10"},"container-title":["Proceedings of the Sixth Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1837110.1837118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:51Z","timestamp":1750246791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,14]]},"references-count":25,"alternative-id":["10.1145\/1837110.1837118","10.1145\/1837110"],"URL":"https:\/\/doi.org\/10.1145\/1837110.1837118","relation":{},"subject":[],"published":{"date-parts":[[2010,7,14]]},"assertion":[{"value":"2010-07-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}