{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:51:52Z","timestamp":1751608312508,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T00:00:00Z","timestamp":1279065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,7,14]]},"DOI":"10.1145\/1837110.1837126","type":"proceedings-article","created":{"date-parts":[[2010,7,22]],"date-time":"2010-07-22T18:52:26Z","timestamp":1279824746000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Improving users' security choices on home wireless networks"],"prefix":"10.1145","author":[{"given":"Justin T.","family":"Ho","sequence":"first","affiliation":[{"name":"Google, Mountain View, CA"}]},{"given":"David","family":"Dearman","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"given":"Khai N.","family":"Truong","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,7,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Balfanz D.","year":"2004","unstructured":"Balfanz , D. , Durfee , G. , Grinter , R. E. , Smetters , D. K. , and Stewart , P . 2004. Network-in-a-box: how to set up a secure wireless network in under a minute . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (San Diego, CA, August 09--13 , 2004 ). USENIX Security Symposium. USENIX Association, Berkeley, CA, 207--221. Balfanz, D., Durfee, G., Grinter, R. E., Smetters, D. K., and Stewart, P. 2004. Network-in-a-box: how to set up a secure wireless network in under a minute. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (San Diego, CA, August 09--13, 2004). USENIX Security Symposium. USENIX Association, Berkeley, CA, 207--221."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015879"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125571"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 6th ACM Conference on Hot Topics in Networks","author":"Calvert K.","year":"2007","unstructured":"Calvert , K. , Edwards , W. and Grinter , R . 2007. Moving toward the middle: the case against the end-to-end argument in home networking . In Proceedings of the 6th ACM Conference on Hot Topics in Networks ( Atlanta, GA, November 14--15 , 2007 ). HotNets-VI. ACM, New York, NY. Calvert, K., Edwards, W. and Grinter, R. 2007. Moving toward the middle: the case against the end-to-end argument in home networking. In Proceedings of the 6th ACM Conference on Hot Topics in Networks (Atlanta, GA, November 14--15, 2007). HotNets-VI. ACM, New York, NY."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769823"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 9th international Conference on Ubiquitous Computing","author":"Chetty M.","year":"2007","unstructured":"Chetty , M. , Sung , J. , and Grinter , R. E . 2007. How smart homes learn: the evolution of the networked home and household . In Proceedings of the 9th international Conference on Ubiquitous Computing ( Innsbruck, Austria, September 16--19 , 2007 ). Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 127--144. Chetty, M., Sung, J., and Grinter, R. E. 2007. How smart homes learn: the evolution of the networked home and household. In Proceedings of the 9th international Conference on Ubiquitous Computing (Innsbruck, Austria, September 16--19, 2007). Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 127--144."},{"key":"e_1_3_2_1_7_1","unstructured":"Fleishman G. 2008. GPU-based WPA\/WPA2 crack struggles with good passwords. Retrieved June 9 2010 from Ars Technica: http:\/\/arstechnica.com\/news.ars\/post\/20081201-gpu-based-wpawpa2-crack-struggles-with-good-passwords.html  Fleishman G. 2008. GPU-based WPA\/WPA2 crack struggles with good passwords. Retrieved June 9 2010 from Ars Technica: http:\/\/arstechnica.com\/news.ars\/post\/20081201-gpu-based-wpawpa2-crack-struggles-with-good-passwords.html"},{"volume-title":"Revised Papers From the 8th Annual international Workshop on Selected Areas in Cryptography. Springer-Verlag","author":"Fluhrer S. R.","key":"e_1_3_2_1_8_1","unstructured":"Fluhrer , S. R. , Mantin , I. , and Shamir , A . 2001. Weaknesses in the Key Scheduling Algorithm of RC4 . In Revised Papers From the 8th Annual international Workshop on Selected Areas in Cryptography. Springer-Verlag , London, 1--24. Fluhrer, S. R., Mantin, I., and Shamir, A. 2001. Weaknesses in the Key Scheduling Algorithm of RC4. In Revised Papers From the 8th Annual international Workshop on Selected Areas in Cryptography. Springer-Verlag, London, 1--24."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.26"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Ninth Conference on European Conference on Computer Supported Cooperative Work","author":"Grinter R. E.","year":"2005","unstructured":"Grinter , R. E. , Edwards , W. K. , Newman , M. W. , and Ducheneaut , N . 2005. The work to make a home network work . In Proceedings of the Ninth Conference on European Conference on Computer Supported Cooperative Work ( Paris, France, September 18--22 , 2005 ). H. Gellersen, K. Schmidt, M. Beaudouin-Lafon, and W. Mackay, Eds. ECSCW. Springer-Verlag New York, New York, NY, 469--488. Grinter, R. E., Edwards, W. K., Newman, M. W., and Ducheneaut, N. 2005. The work to make a home network work. In Proceedings of the Ninth Conference on European Conference on Computer Supported Cooperative Work (Paris, France, September 18--22, 2005). H. Gellersen, K. Schmidt, M. Beaudouin-Lafon, and W. Mackay, Eds. ECSCW. Springer-Verlag New York, New York, NY, 469--488."},{"key":"e_1_3_2_1_11_1","volume-title":"Heavy web downloaders face broadband fees. Retrieved","author":"Hartley M.","year":"2010","unstructured":"Hartley , M. 2008. Heavy web downloaders face broadband fees. Retrieved June 9, 2010 from The Globe and Mail : http:\/\/www.theglobeandmail.com\/news\/technology\/article675666.ece Hartley, M. 2008. Heavy web downloaders face broadband fees. Retrieved June 9, 2010 from The Globe and Mail: http:\/\/www.theglobeandmail.com\/news\/technology\/article675666.ece"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 9th international Conference on Ubiquitous Computing","author":"Kindberg T.","year":"2007","unstructured":"Kindberg , T. and Jones , T . 2007. \"Merolyn the phone\": a study of Bluetooth naming practices . In Proceedings of the 9th international Conference on Ubiquitous Computing ( Innsbruck, Austria, September 16--19 , 2007 ). Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 318--335. Kindberg, T. and Jones, T. 2007. \"Merolyn the phone\": a study of Bluetooth naming practices. In Proceedings of the 9th international Conference on Ubiquitous Computing (Innsbruck, Austria, September 16--19, 2007). Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 318--335."},{"key":"e_1_3_2_1_13_1","unstructured":"IEEE OUI and Company_id Assignments. 2008. Retrieved June 9 2010 from the IEEE Standards Association: http:\/\/standards.ieee.org\/regauth\/oui\/index.shtml  IEEE OUI and Company_id Assignments. 2008. Retrieved June 9 2010 from the IEEE Standards Association: http:\/\/standards.ieee.org\/regauth\/oui\/index.shtml"},{"key":"e_1_3_2_1_14_1","volume-title":"MPAA Says No Proof Needed in P2P Copyright Infringement Lawsuits. Retrieved","author":"Kravets D.","year":"2010","unstructured":"Kravets , D. 2008. MPAA Says No Proof Needed in P2P Copyright Infringement Lawsuits. Retrieved June 9, 2010 from Wired : http:\/\/www.wired.com\/threatlevel\/2008\/06\/mpaa-says-no-pr\/ Kravets, D. 2008. MPAA Says No Proof Needed in P2P Copyright Infringement Lawsuits. Retrieved June 9, 2010 from Wired: http:\/\/www.wired.com\/threatlevel\/2008\/06\/mpaa-says-no-pr\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Plugged in: Wireless Networking Baffles Some Customers","author":"MacMillan","year":"2006","unstructured":"R. MacMillan . 2006. Plugged in: Wireless Networking Baffles Some Customers . Reuters News ( 2006 , March). R. MacMillan. 2006. Plugged in: Wireless Networking Baffles Some Customers. Reuters News (2006, March)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394494"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572534"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642615"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240712"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357217"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996948"},{"volume-title":"2010 from The City of","author":"City","key":"e_1_3_2_1_22_1","unstructured":"City of Toronto Demographics Information. 2008. Retrieved June 9 , 2010 from The City of Toronto : http:\/\/www.toronto.ca\/demographics\/ City of Toronto Demographics Information. 2008. Retrieved June 9, 2010 from The City of Toronto: http:\/\/www.toronto.ca\/demographics\/"},{"key":"e_1_3_2_1_23_1","volume-title":"Networks in the Home: Connected Consumer Electronics. Parks Associates (June","author":"Wang H.","year":"2006","unstructured":"Wang , H. 2006. Networks in the Home: Connected Consumer Electronics. Parks Associates (June 2006 ). Wang, H. 2006. Networks in the Home: Connected Consumer Electronics. Parks Associates (June 2006)."},{"key":"e_1_3_2_1_24_1","unstructured":"Wireless Infonetics Research Inc. 2008. Driven by 802.11n Technology Worldwide Wireless LAN Semiconductor Market Will Experience Double-Digit Growth Through 2012 IDC Predicts.  Wireless Infonetics Research Inc. 2008. Driven by 802.11n Technology Worldwide Wireless LAN Semiconductor Market Will Experience Double-Digit Growth Through 2012 IDC Predicts."},{"volume-title":"Proceedings of the 11th International Conference on Human-Computer Interaction (Rio de Janerio, Brasil, September 10--14, 2007). INTERACT '07. Springer-Verlag","author":"Yang J.","key":"e_1_3_2_1_25_1","unstructured":"Yang , J. and Edwards , W. K . 2007. ICEbox: toward easy-to-use home networking . In Proceedings of the 11th International Conference on Human-Computer Interaction (Rio de Janerio, Brasil, September 10--14, 2007). INTERACT '07. Springer-Verlag , Berlin, Heidelberg. 197--210. Yang, J. and Edwards, W. K. 2007. ICEbox: toward easy-to-use home networking. In Proceedings of the 11th International Conference on Human-Computer Interaction (Rio de Janerio, Brasil, September 10--14, 2007). INTERACT '07. Springer-Verlag, Berlin, Heidelberg. 197--210."}],"event":{"name":"SOUPS '10: Symposium on Usable Privacy and Security","sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Redmond Washington USA","acronym":"SOUPS '10"},"container-title":["Proceedings of the Sixth Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1837110.1837126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:51Z","timestamp":1750246791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,14]]},"references-count":25,"alternative-id":["10.1145\/1837110.1837126","10.1145\/1837110"],"URL":"https:\/\/doi.org\/10.1145\/1837110.1837126","relation":{},"subject":[],"published":{"date-parts":[[2010,7,14]]},"assertion":[{"value":"2010-07-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}