D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, Talking to strangers: Authentication in ad-hoc wireless networks, NDSS, 2002.

M. Cagalj, S. Capkun, and J. Hubaux, Key Agreement in Peer-to-Peer Wireless Networks, Proceedings of the IEEE Special Issue on Security and Cryptography, 2006.
DOI : 10.1109/JPROC.2005.862475

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.5850

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720

C. Gehrmann, C. J. Mitchell, and K. Nyberg, Manual authentication for wireless devices, RSA Cryptobytes, vol.7, issue.1, pp.29-37, 2004.

M. T. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik et al., Using audio in secure device pairing, International Journal of Security and Networks, vol.4, issue.1/2, pp.57-68, 2009.
DOI : 10.1504/IJSN.2009.023426

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.9384

T. Kindberg and K. Zhang, Validating and Securing Spontaneous Associations between Wireless Devices, Information Security, pp.44-53
DOI : 10.1007/10958513_4

S. Laur and K. Nyberg, Efficient Mutual Data Authentication Using Manually Authenticated Strings, Cryptology and Network Security, pp.90-107
DOI : 10.1007/11935070_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.2280

R. Mayrhofer and H. Gellersen, Shake Well Before Use: Authentication Based on Accelerometer Data, Pervasive, pp.144-161, 2007.
DOI : 10.1007/978-3-540-72037-9_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9793

J. M. Mccune, A. Perrig, and M. K. Reiter, Seeing-is-believing: Using camera phones for human-verifiable authentication. Security and Privacy, IEEE Symposium on, vol.0, pp.110-124, 2005.

A. Perrig and D. Song, Hash visualization: a new technique to improve realworld security, International Workshop on Cryptographic Techniques and E-Commerce, pp.131-138, 1999.

R. Prasad and N. Saxena, Efficient Device Pairing Using ???Human-Comparable??? Synchronized Audiovisual Patterns, Applied Cryptography and Network Security, pp.328-345
DOI : 10.1007/978-3-540-68914-0_20

URL : http://cis.poly.edu/~nsaxena/docs/sr08.pdf

N. Saxena, J. Ekberg, K. Kostiainen, and N. Asokan, Secure device pairing based on a visual channel, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.306-313, 2006.
DOI : 10.1109/SP.2006.35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.4242

D. Singelee and B. Preneel, Location verification using secure distance bounding protocols, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., 2005.
DOI : 10.1109/MAHSS.2005.1542879

URL : https://www.cosic.esat.kuleuven.be/publications/article-760.pdf

C. Soriente, G. Tsudik, and E. Uzun, HAPADEP: Human-Assisted Pure Audio Device Pairing, Lecture Notes in Computer Science, vol.5222, pp.385-400
DOI : 10.1007/978-3-540-85886-7_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.6927

C. Soriente, G. Tsudik, and E. Uzun, Beda: Button-enabled device pairing, Cryptology ePrint Archive Report, vol.246, 2007.

F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Protocols, 7th International Workshop Proceedings, pp.172-194, 1999.
DOI : 10.1007/10720107_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.1450

S. Vaudenay, Secure Communications over Insecure Channels Based on Short Authenticated Strings, Advances in Cryptology CRYPTO 2005, pp.309-326
DOI : 10.1007/11535218_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.5120