Proceedings of the Sixth Symposium on Usable Privacy and Security 2010
DOI: 10.1145/1837110.1837118
|View full text |Cite
|
Sign up to set email alerts
|

Influence of user perception, security needs, and social factors on device pairing method choices

Abstract: Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard -PIN-based authentication. Evaluating such improvements is difficult. Most comparative laboratory studies have so far mainly focused on completeness, trying to find the single best method among the dozens of proposed approaches -one that is both rated the most usable by test subjects, and which provides the most robust security guarantees. This search for the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(30 citation statements)
references
References 17 publications
0
30
0
Order By: Relevance
“…Among five prominent categories of actions (i.e., button event, search and select, device touch, proximity, and gesture), no single action dominated for natural interaction. Similarly, ION, et al [18] , reported that a technically secure and easy-to-use method does not always benefit the user. They asserted that the preferred actions for device connection depended on the user and situation.…”
Section: Related Work On Device Connectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Among five prominent categories of actions (i.e., button event, search and select, device touch, proximity, and gesture), no single action dominated for natural interaction. Similarly, ION, et al [18] , reported that a technically secure and easy-to-use method does not always benefit the user. They asserted that the preferred actions for device connection depended on the user and situation.…”
Section: Related Work On Device Connectionmentioning
confidence: 99%
“…Their work helped designers and researchers understand the complexity of the problem. ION et al [18] , found that user interaction is influenced by the time constraints of the user, the sensitivity of the data involved, and social conventions that are appropriate for a given environment. They argued that designers need to be aware of the users' mental model, needs and social situations.…”
Section: Related Work On Device Connectionmentioning
confidence: 99%
“…Interesting studies have recently been reported by Chong et al [12] and Ion et al [13]. The major findings of these papers reveal that there is no dominant device-pairing method in real life.…”
Section: Out-of-band Channelsmentioning
confidence: 99%
“…Ion et al [7] used mock-ups to investigate the usability of device pairing methods with regard to perceived security needs in di erent real-life situation.…”
Section: Related Workmentioning
confidence: 99%