1. Balfanz D, Durfee G, Grinter RE, Smetters DK, Stewart P (2004) Network-in-a-box: how to set up a secure wireless network in under a minute. In: SSYM’04: Proceedings of the 13th conference on USENIX security symposium, USENIX Association, pp 207–222
2. Balfanz D, Smetters D, Stewart P, Wong HC (2002) Talking to strangers: authentication in ad-hoc wireless networks. In: NDSS’02: Proceedings of the 2002 network and distributed systems security symposium
3. Beigl M (1999) Point & Click-interaction in smart environments. In: HUC ’99: Proceedings of the 1st international symposium on handheld and ubiquitous computing. Springer, pp 311–313
4. Bichler D, Stromberg G, Huemer M, Löw M (2007) Key generation based on acceleration data of shaking processes. In: UbiComp 2007: ubiquitous computing. Springer, pp 304–317
5. Bluetooth Special Interest Group (2006) Simple pairing whitepaper (revision v10r00)