Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence

M Conti, SK Das, C Bisdikian, M Kumar, LM Ni… - Pervasive and mobile …, 2012 - Elsevier
The physical environment is becoming more and more saturated with computing and
communication entities that interact among themselves, as well as with users: virtually …

Usability ratings for everyday products measured with the system usability scale

PT Kortum, A Bangor - International Journal of Human-Computer …, 2013 - Taylor & Francis
This article characterizes the usability of 14 common, everyday products using the System
Usability Scale (SUS). More than 1,000 users were queried about the usability of these …

A survey of user interaction for spontaneous device association

MK Chong, R Mayrhofer, H Gellersen - ACM Computing Surveys (CSUR …, 2014 - dl.acm.org
In a wireless world, users can establish ad hoc virtual connections between devices that are
unhampered by cables. This process is known as spontaneous device association. A wide …

Secure ad hoc trust initialization and key management in wireless body area networks

M Li, S Yu, JD Guttman, W Lou, K Ren - ACM Transactions on sensor …, 2013 - dl.acm.org
The body area network (BAN) is a key enabling technology in e-healthcare. An important
security issue is to establish initial trust relationships among the BAN devices before they …

Sounds Good? Fast and Secure Contact Exchange in Groups

F Putz, S Haesler, M Hollick - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …

Wiretap** via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones

M Shirvanian, N Saxena - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Establishing secure voice, video and text over Internet (VoIP) communications is a crucial
task necessary to prevent eavesdrop** and man-in-the-middle attacks. The traditional …

[HTML][HTML] Review of the use of human senses and capabilities in cryptography

K Halunen, OM Latvala - Computer Science Review, 2021 - Elsevier
Cryptography is a key element in establishing trust and enabling services in the digital
world. Currently, cryptography is realized with mathematical operations and represented in …

Safeslinger: easy-to-use and secure public-key exchange

M Farb, YH Lin, THJ Kim, J McCune… - Proceedings of the 19th …, 2013 - dl.acm.org
Users regularly experience a crisis of confidence on the Internet. Is that email or instant
message truly originating from the claimed individual? Such doubts are commonly resolved …

Secure device pairing: A survey

S Mirzadeh, H Cruickshank… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
In this paper, we discuss secure device pairing mechanisms in detail. We explain man-in-the-
middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show …

The effect of user variables on academic websites usability: An empirical study

K Sagar, A Saha - Journal of Statistics and Management Systems, 2019 - Taylor & Francis
The aim of the study is to delineate quantitative usability evaluation of 50-academic websites
using System Usability Scale. 600-participants are enquired about usability of these …