Usability Analysis of Secure Pairing Methods View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

Ersin Uzun , Kristiina Karvonen , N. Asokan

ABSTRACT

Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electronics with wireless communication abilities has made the problem more urgent than ever before. During the last few years, several solutions have appeared in the research literature. Several standardization bodies have also been working on improved setup procedures. All these protocols provide certain level of security, but several new questions arise, such as ”how to implement this protocol so that it is easy to use?” and ”is it still secure when used by a non-technical person?” In this paper, we attempt to answer these questions by carrying out a comparative usability evaluation of selected methods to derive some insights into the usability and security of these methods as well as strategies for implementing them. More... »

PAGES

307-324

Book

TITLE

Financial Cryptography and Data Security

ISBN

978-3-540-77365-8
978-3-540-77366-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-77366-5_29

DOI

http://dx.doi.org/10.1007/978-3-540-77366-5_29

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1027024994


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nokia Research Center, Helsinki, Finland", 
          "id": "http://www.grid.ac/institutes/grid.6533.3", 
          "name": [
            "University of California, 92697, Irvine, CA, USA", 
            "Nokia Research Center, Helsinki, Finland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Uzun", 
        "givenName": "Ersin", 
        "id": "sg:person.016065225667.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065225667.49"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Helsinki University of Technology, Helsinki, Finland", 
          "id": "http://www.grid.ac/institutes/grid.5373.2", 
          "name": [
            "Helsinki University of Technology, Helsinki, Finland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Karvonen", 
        "givenName": "Kristiina", 
        "id": "sg:person.012113372265.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012113372265.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Nokia Research Center, Helsinki, Finland", 
          "id": "http://www.grid.ac/institutes/grid.6533.3", 
          "name": [
            "Helsinki University of Technology, Helsinki, Finland", 
            "Nokia Research Center, Helsinki, Finland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Asokan", 
        "givenName": "N.", 
        "id": "sg:person.013645373402.33", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013645373402.33"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electronics with wireless communication abilities has made the problem more urgent than ever before. During the last few years, several solutions have appeared in the research literature. Several standardization bodies have also been working on improved setup procedures. All these protocols provide certain level of security, but several new questions arise, such as \u201dhow to implement this protocol so that it is easy to use?\u201d and \u201dis it still secure when used by a non-technical person?\u201d In this paper, we attempt to answer these questions by carrying out a comparative usability evaluation of selected methods to derive some insights into the usability and security of these methods as well as strategies for implementing them.", 
    "editor": [
      {
        "familyName": "Dietrich", 
        "givenName": "Sven", 
        "type": "Person"
      }, 
      {
        "familyName": "Dhamija", 
        "givenName": "Rachna", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-77366-5_29", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-77365-8", 
        "978-3-540-77366-5"
      ], 
      "name": "Financial Cryptography and Data Security", 
      "type": "Book"
    }, 
    "keywords": [
      "end-user devices", 
      "wireless communication ability", 
      "non-technical persons", 
      "comparative usability evaluation", 
      "security associations", 
      "ordinary users", 
      "usability analysis", 
      "usability evaluation", 
      "standardization bodies", 
      "challenging task", 
      "setup procedure", 
      "pairing method", 
      "security", 
      "communication ability", 
      "usability", 
      "users", 
      "protocol", 
      "certain level", 
      "task", 
      "popularity", 
      "method", 
      "personal electronics", 
      "devices", 
      "research literature", 
      "solution", 
      "new questions", 
      "electronics", 
      "evaluation", 
      "strategies", 
      "ability", 
      "questions", 
      "persons", 
      "literature", 
      "procedure", 
      "analysis", 
      "insights", 
      "levels", 
      "years", 
      "body", 
      "association", 
      "paper", 
      "problem", 
      "powerful personal electronics", 
      "Secure Pairing Methods"
    ], 
    "name": "Usability Analysis of Secure Pairing Methods", 
    "pagination": "307-324", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1027024994"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-77366-5_29"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-77366-5_29", 
      "https://app.dimensions.ai/details/publication/pub.1027024994"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-12-01T20:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/chapter/chapter_231.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-77366-5_29"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77366-5_29'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77366-5_29'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77366-5_29'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-77366-5_29'


 

This table displays all metadata directly associated to this object as RDF triples.

128 TRIPLES      23 PREDICATES      70 URIs      63 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-77366-5_29 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N222242c4818c4e4fb2aff068b75c9d29
4 schema:datePublished 2007
5 schema:datePublishedReg 2007-01-01
6 schema:description Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electronics with wireless communication abilities has made the problem more urgent than ever before. During the last few years, several solutions have appeared in the research literature. Several standardization bodies have also been working on improved setup procedures. All these protocols provide certain level of security, but several new questions arise, such as ”how to implement this protocol so that it is easy to use?” and ”is it still secure when used by a non-technical person?” In this paper, we attempt to answer these questions by carrying out a comparative usability evaluation of selected methods to derive some insights into the usability and security of these methods as well as strategies for implementing them.
7 schema:editor Ncdced936e557430f991fbb22821a025b
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Ne9fddccd7784476395c2a5fd79a95926
12 schema:keywords Secure Pairing Methods
13 ability
14 analysis
15 association
16 body
17 certain level
18 challenging task
19 communication ability
20 comparative usability evaluation
21 devices
22 electronics
23 end-user devices
24 evaluation
25 insights
26 levels
27 literature
28 method
29 new questions
30 non-technical persons
31 ordinary users
32 pairing method
33 paper
34 personal electronics
35 persons
36 popularity
37 powerful personal electronics
38 problem
39 procedure
40 protocol
41 questions
42 research literature
43 security
44 security associations
45 setup procedure
46 solution
47 standardization bodies
48 strategies
49 task
50 usability
51 usability analysis
52 usability evaluation
53 users
54 wireless communication ability
55 years
56 schema:name Usability Analysis of Secure Pairing Methods
57 schema:pagination 307-324
58 schema:productId N5aff20d73161431dbafd0dd78d6739b3
59 N8ca9623ed195422c861ccc062c5d7d21
60 schema:publisher N7c0df2fae2724d8b806ea8b181f1ca53
61 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027024994
62 https://doi.org/10.1007/978-3-540-77366-5_29
63 schema:sdDatePublished 2021-12-01T20:01
64 schema:sdLicense https://scigraph.springernature.com/explorer/license/
65 schema:sdPublisher N7d412056d9ef433bb2673f7f53e298d6
66 schema:url https://doi.org/10.1007/978-3-540-77366-5_29
67 sgo:license sg:explorer/license/
68 sgo:sdDataset chapters
69 rdf:type schema:Chapter
70 N222242c4818c4e4fb2aff068b75c9d29 rdf:first sg:person.016065225667.49
71 rdf:rest Nfd1546ca2b264ff4a644fee83f785905
72 N44f7f75840114467982b64666b8b32d8 schema:familyName Dietrich
73 schema:givenName Sven
74 rdf:type schema:Person
75 N5aff20d73161431dbafd0dd78d6739b3 schema:name doi
76 schema:value 10.1007/978-3-540-77366-5_29
77 rdf:type schema:PropertyValue
78 N7c0df2fae2724d8b806ea8b181f1ca53 schema:name Springer Nature
79 rdf:type schema:Organisation
80 N7d412056d9ef433bb2673f7f53e298d6 schema:name Springer Nature - SN SciGraph project
81 rdf:type schema:Organization
82 N8013e259a9e64a11bd7a034597537a12 rdf:first sg:person.013645373402.33
83 rdf:rest rdf:nil
84 N8ca9623ed195422c861ccc062c5d7d21 schema:name dimensions_id
85 schema:value pub.1027024994
86 rdf:type schema:PropertyValue
87 Nb2d38869b0ac421fb9c4323c26cc6b25 schema:familyName Dhamija
88 schema:givenName Rachna
89 rdf:type schema:Person
90 Nbd8858e7097447aa96dde0d7b30c2526 rdf:first Nb2d38869b0ac421fb9c4323c26cc6b25
91 rdf:rest rdf:nil
92 Ncdced936e557430f991fbb22821a025b rdf:first N44f7f75840114467982b64666b8b32d8
93 rdf:rest Nbd8858e7097447aa96dde0d7b30c2526
94 Ne9fddccd7784476395c2a5fd79a95926 schema:isbn 978-3-540-77365-8
95 978-3-540-77366-5
96 schema:name Financial Cryptography and Data Security
97 rdf:type schema:Book
98 Nfd1546ca2b264ff4a644fee83f785905 rdf:first sg:person.012113372265.26
99 rdf:rest N8013e259a9e64a11bd7a034597537a12
100 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
101 schema:name Information and Computing Sciences
102 rdf:type schema:DefinedTerm
103 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
104 schema:name Data Format
105 rdf:type schema:DefinedTerm
106 sg:person.012113372265.26 schema:affiliation grid-institutes:grid.5373.2
107 schema:familyName Karvonen
108 schema:givenName Kristiina
109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012113372265.26
110 rdf:type schema:Person
111 sg:person.013645373402.33 schema:affiliation grid-institutes:grid.6533.3
112 schema:familyName Asokan
113 schema:givenName N.
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013645373402.33
115 rdf:type schema:Person
116 sg:person.016065225667.49 schema:affiliation grid-institutes:grid.6533.3
117 schema:familyName Uzun
118 schema:givenName Ersin
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065225667.49
120 rdf:type schema:Person
121 grid-institutes:grid.5373.2 schema:alternateName Helsinki University of Technology, Helsinki, Finland
122 schema:name Helsinki University of Technology, Helsinki, Finland
123 rdf:type schema:Organization
124 grid-institutes:grid.6533.3 schema:alternateName Nokia Research Center, Helsinki, Finland
125 schema:name Helsinki University of Technology, Helsinki, Finland
126 Nokia Research Center, Helsinki, Finland
127 University of California, 92697, Irvine, CA, USA
128 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...