{"id":"https://openalex.org/W2107015241","doi":"https://doi.org/10.1109/tifs.2010.2096217","title":"Secure Device Pairing Based on a Visual Channel: Design and Usability Study","display_name":"Secure Device Pairing Based on a Visual Channel: Design and Usability Study","publication_year":2010,"publication_date":"2010-12-10","ids":{"openalex":"https://openalex.org/W2107015241","doi":"https://doi.org/10.1109/tifs.2010.2096217","mag":"2107015241"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2010.2096217","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2096217","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059730489","display_name":"Nitesh Saxena","orcid":"https://orcid.org/0000-0001-6083-104X"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]},{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nitesh Saxena","raw_affiliation_strings":["Polytechnic Institute of New York University, USA","Comput. Sci. & Eng. Dept., Polytech. Inst. of New York Univ., Brooklyn, NY, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Polytechnic Institute of New York University, USA","institution_ids":["https://openalex.org/I90965887","https://openalex.org/I57206974"]},{"raw_affiliation_string":"Comput. Sci. & Eng. Dept., Polytech. Inst. of New York Univ., Brooklyn, NY, USA#TAB#","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048305988","display_name":"Jan-Erik Ekberg","orcid":"https://orcid.org/0009-0007-5432-6128"},"institutions":[{"id":"https://openalex.org/I2738502077","display_name":"Nokia (Finland)","ror":"https://ror.org/04pkc8m17","country_code":"FI","type":"company","lineage":["https://openalex.org/I2738502077"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jan-Erik Ekberg","raw_affiliation_strings":["Nokia Research Center, Helsinki, Finland","[Nokia Research Center, Helsinki, Finland]"],"affiliations":[{"raw_affiliation_string":"Nokia Research Center, Helsinki, Finland","institution_ids":["https://openalex.org/I2738502077"]},{"raw_affiliation_string":"[Nokia Research Center, Helsinki, Finland]","institution_ids":["https://openalex.org/I2738502077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021906979","display_name":"Kari Kostiainen","orcid":"https://orcid.org/0000-0002-9092-8683"},"institutions":[{"id":"https://openalex.org/I2738502077","display_name":"Nokia (Finland)","ror":"https://ror.org/04pkc8m17","country_code":"FI","type":"company","lineage":["https://openalex.org/I2738502077"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Kari Kostiainen","raw_affiliation_strings":["Nokia Research Center, Helsinki, Finland","[Nokia Research Center, Helsinki, Finland]"],"affiliations":[{"raw_affiliation_string":"Nokia Research Center, Helsinki, Finland","institution_ids":["https://openalex.org/I2738502077"]},{"raw_affiliation_string":"[Nokia Research Center, Helsinki, Finland]","institution_ids":["https://openalex.org/I2738502077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016685507","display_name":"N. Asokan","orcid":"https://orcid.org/0000-0002-5093-9871"},"institutions":[{"id":"https://openalex.org/I2738502077","display_name":"Nokia (Finland)","ror":"https://ror.org/04pkc8m17","country_code":"FI","type":"company","lineage":["https://openalex.org/I2738502077"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"N. Asokan","raw_affiliation_strings":["Nokia Research Center, Helsinki, Finland","[Nokia Research Center, Helsinki, Finland]"],"affiliations":[{"raw_affiliation_string":"Nokia Research Center, Helsinki, Finland","institution_ids":["https://openalex.org/I2738502077"]},{"raw_affiliation_string":"[Nokia Research Center, Helsinki, Finland]","institution_ids":["https://openalex.org/I2738502077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059730489"],"corresponding_institution_ids":["https://openalex.org/I57206974","https://openalex.org/I90965887"],"apc_list":null,"apc_paid":null,"fwci":4.2849,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95028775,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"6","issue":"1","first_page":"28","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.8829605579376221},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8483244776725769},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7318670749664307},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6201825141906738},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6117831468582153},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47646379470825195},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.41682565212249756},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3687574863433838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.230575293302536},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07584702968597412}],"concepts":[{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.8829605579376221},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8483244776725769},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7318670749664307},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6201825141906738},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6117831468582153},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47646379470825195},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41682565212249756},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3687574863433838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.230575293302536},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07584702968597412},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2010.2096217","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2096217","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.831.7592","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.831.7592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.cis.uab.edu/saxena/docs/seka-tifs10.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.836.5369","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.836.5369","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.cis.uab.edu/saxena/docs/seka-tifs11.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W46855484","https://openalex.org/W197864537","https://openalex.org/W1542059364","https://openalex.org/W1542316315","https://openalex.org/W1548740383","https://openalex.org/W1572503422","https://openalex.org/W1733713784","https://openalex.org/W1877498291","https://openalex.org/W1891543496","https://openalex.org/W2001619264","https://openalex.org/W2047241038","https://openalex.org/W2088028234","https://openalex.org/W2099042427","https://openalex.org/W2110495618","https://openalex.org/W2116897550","https://openalex.org/W2117130609","https://openalex.org/W2129911440","https://openalex.org/W2134120396","https://openalex.org/W2141136786","https://openalex.org/W2171528862","https://openalex.org/W3032387077","https://openalex.org/W6632593034","https://openalex.org/W6634365407","https://openalex.org/W6639556838","https://openalex.org/W6675040772","https://openalex.org/W6676608817","https://openalex.org/W7001942639"],"related_works":["https://openalex.org/W3015473028","https://openalex.org/W3201176751","https://openalex.org/W2057898405","https://openalex.org/W2029180842","https://openalex.org/W2051379014","https://openalex.org/W2953807518","https://openalex.org/W1993094293","https://openalex.org/W2258335979","https://openalex.org/W2890366349","https://openalex.org/W3119345543"],"abstract_inverted_index":{"\u201cPairing\u201d":[0],"is":[1],"the":[2,59,139,177,198],"establishment":[3],"of":[4,61,145,186,200],"authenticated":[5,48],"key":[6],"agreement":[7],"between":[8,92,97],"two":[9,93],"devices":[10,16,34,94,169],"over":[11],"a":[12,62,87,98,119,129,181,187,193,201],"wireless":[13],"channel.":[14],"Such":[15],"are":[17,71,81],"ad":[18],"hoc":[19],"in":[20,83],"nature":[21],"as":[22,96,133,192],"they":[23],"lack":[24],"any":[25],"common":[26],"preshared":[27],"secrets":[28],"or":[29],"trusted":[30],"authority.":[31],"Fortunately,":[32],"these":[33],"can":[35,46,114,164],"be":[36,47,55,115,165],"connected":[37],"via":[38],"auxiliary":[39],"physical":[40,75,89],"(audio,":[41],"visual,":[42],"tactile)":[43],"channels":[44],"which":[45],"by":[49,151],"human":[50],"users.":[51],"They":[52],"can,":[53],"therefore,":[54],"used":[56,166],"to":[57,180],"form":[58],"basis":[60],"pairing":[63,67,79,147,156],"operation.":[64],"Recently":[65],"proposed":[66,154,207],"protocols":[68],"and":[69,101,142],"methods":[70,125],"based":[72],"upon":[73],"bidirectional":[74],"channels.":[76],"However,":[77],"various":[78],"scenarios":[80],"asymmetric":[82],"nature,":[84],"i.e.,":[85],"only":[86,128],"unidirectional":[88,120],"channel":[90,162],"exists":[91],"(such":[95],"cell":[99],"phone":[100],"an":[102],"access":[103],"point).":[104],"In":[105,149],"this":[106],"paper,":[107],"we":[108,158],"show":[109],"how":[110,160],"strong":[111],"mutual":[112],"authentication":[113,163],"achieved":[116],"even":[117,167],"with":[118],"visual":[121,161],"channel,":[122],"where":[123],"prior":[124,146],"could":[126,136],"provide":[127],"weaker":[130],"property":[131],"termed":[132],"presence.":[134],"This":[135],"help":[137],"reduce":[138],"execution":[140],"time":[141],"improve":[143],"usability":[144,203],"methods.":[148],"addition,":[150],"adopting":[152],"recently":[153],"improved":[155],"protocols,":[157],"propose":[159],"on":[168],"that":[170],"have":[171],"very":[172],"limited":[173],"displaying":[174],"capabilities,":[175],"all":[176],"way":[178],"down":[179],"device":[182],"whose":[183],"display":[184],"consists":[185],"cheap":[188],"single":[189],"light-source,":[190],"such":[191],"light-emitting":[194],"diode.":[195],"We":[196],"present":[197],"results":[199],"preliminary":[202],"study":[204],"evaluating":[205],"our":[206],"method.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
