Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence
The physical environment is becoming more and more saturated with computing and
communication entities that interact among themselves, as well as with users: virtually …
communication entities that interact among themselves, as well as with users: virtually …
Usability ratings for everyday products measured with the system usability scale
PT Kortum, A Bangor - International Journal of Human-Computer …, 2013 - Taylor & Francis
This article characterizes the usability of 14 common, everyday products using the System
Usability Scale (SUS). More than 1,000 users were queried about the usability of these …
Usability Scale (SUS). More than 1,000 users were queried about the usability of these …
A survey of user interaction for spontaneous device association
In a wireless world, users can establish ad hoc virtual connections between devices that are
unhampered by cables. This process is known as spontaneous device association. A wide …
unhampered by cables. This process is known as spontaneous device association. A wide …
Secure ad hoc trust initialization and key management in wireless body area networks
The body area network (BAN) is a key enabling technology in e-healthcare. An important
security issue is to establish initial trust relationships among the BAN devices before they …
security issue is to establish initial trust relationships among the BAN devices before they …
Sounds Good? Fast and Secure Contact Exchange in Groups
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …
current approaches lack usability and scalability for larger groups of users. We evaluate the …
Wiretap** via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones
Establishing secure voice, video and text over Internet (VoIP) communications is a crucial
task necessary to prevent eavesdrop** and man-in-the-middle attacks. The traditional …
task necessary to prevent eavesdrop** and man-in-the-middle attacks. The traditional …
[HTML][HTML] Review of the use of human senses and capabilities in cryptography
K Halunen, OM Latvala - Computer Science Review, 2021 - Elsevier
Cryptography is a key element in establishing trust and enabling services in the digital
world. Currently, cryptography is realized with mathematical operations and represented in …
world. Currently, cryptography is realized with mathematical operations and represented in …
Safeslinger: easy-to-use and secure public-key exchange
Users regularly experience a crisis of confidence on the Internet. Is that email or instant
message truly originating from the claimed individual? Such doubts are commonly resolved …
message truly originating from the claimed individual? Such doubts are commonly resolved …
Secure device pairing: A survey
S Mirzadeh, H Cruickshank… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
In this paper, we discuss secure device pairing mechanisms in detail. We explain man-in-the-
middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show …
middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show …
The effect of user variables on academic websites usability: An empirical study
K Sagar, A Saha - Journal of Statistics and Management Systems, 2019 - Taylor & Francis
The aim of the study is to delineate quantitative usability evaluation of 50-academic websites
using System Usability Scale. 600-participants are enquired about usability of these …
using System Usability Scale. 600-participants are enquired about usability of these …