|
[1]. K. Nickel and R. Stiefelhagen. Visual recognition of pointing gestures for human-robot interaction. Image Vision Comput., 25(12):1875–1884, 2007. [2]. B. Kusy, A. Ledeczi, and X. Koutsoukos. Tracking mobile nodes using rf doppler shifts. In SenSys ’07: Proc. of the 5th Intl. conference on Embedded networked sensor systems, pages 29–42, New York, NY, USA, 2007. ACM. [3]. IEEE 802.15.1 Bluetooth http://www.bluetooth.com, Bluetooth SIG Bluetooth Specification v1.1,’Februayr,2001 [4]. QR code. http://www.nttdocomo.co.jp/english/service/imode/make/content/barcode/tool/. [5]. Semacode. http://semacode.com/. [6]. J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing:Using camera phones for human-veri?able authentication. In SP ’05:Proceedings of the 2005 IEEE Symposium on Security and Privacy,pages 110–124, Washington, DC, USA, 2005. IEEE Computer Society. [7]. N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In SP ’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 306–313, Washington, DC, USA, 2006. IEEE Computer Society. [8]. M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun.Loud and clear: Human-veri?able authentication based on audio. In ICDCS ’06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 10, Washington, DC, USA,2006. IEEE Computer Society. [9]. J.Rekimoto, Y.Ayatsuka, and M. Kohno. Synctap: An interaction technique for mobile networking. In Mobile HCI, pages 104-115,2003. [10]. L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In UbiComp ’01: Proceedings of the 3rd international conference on Ubiquitous Computing, pages 116–122, London, UK, 2001. Springer-Verlag. [11]. K.Hinckley.Synchronous gestures for multiple persons and computers.In UIST’03:Proceedings of the 16th annual ACM symposium on User interface software and technology,pages 149-158, New York,NY,USA,2003.ACM [12]. R.Mayrhofer and H.Gellersen.Shake well before use: Authentication base on accelerometer data.In A. LaMarce, M.Langheinrich, and K.N.Troung,editors, Pervasive,volume 4480 of Lecutre Notes in Computer Science,page 144-161.Springer,2007 [13]. Wu, F.-J., Chu, F.-I., and Tseng, Y.-C. Cyber-Physical Handshake. In Proc. SIGCOMM 2011, ACM Press, (2011). [14]. Peng, C., Shen, G., Zhang, Y., Lu, S.: Point&;Connect: intention-based device pairing for mobile phone users. In: Proc. MobiSys 2009, pp. 137–150. ACM, New York (2009) [15]. R. Mayrhofer, H. Gellersen, and M. Hazas. Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction. In Ubicomp, pages 199–216, 2007. [16]. G. Schmidt, Y. Baillot, D. G. Brown, E. B. Tomlin, and J. E. I. Swan. Toward disambiguating multiple selections for frustum-based pointing. In 3DUI ’06: Proceedings of the 3D User Interfaces, pages 87–94, Washington, DC, USA, 2006. IEEE Computer Society. [17]. Android, http://developer.android.com/sdk/index.html [18]. Eclipse, http://www.eclipse.org/downloads
|