{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T10:00:13Z","timestamp":1773223213177,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,31]],"date-time":"2008-03-31T00:00:00Z","timestamp":1206921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,31]]},"DOI":"10.1145\/1352533.1352569","type":"proceedings-article","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T16:11:28Z","timestamp":1207066288000},"page":"220-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Simple and effective defense against evil twin access points"],"prefix":"10.1145","author":[{"given":"Volker","family":"Roth","sequence":"first","affiliation":[{"name":"FX Palo Alto Laboratory, Palo Alto, CA"}]},{"given":"Wolfgang","family":"Polak","sequence":"additional","affiliation":[{"name":"FX Palo Alto Laboratory, Palo Alto, CA"}]},{"given":"Eleanor","family":"Rieffel","sequence":"additional","affiliation":[{"name":"FX Palo Alto Laboratory, Palo Alto, CA"}]},{"given":"Thea","family":"Turner","sequence":"additional","affiliation":[{"name":"FX Palo Alto Laboratory, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2008,3,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Los Angeles Times","author":"Abdollah T.","year":"2007","unstructured":"Abdollah , T. Ensnared on the wireless Web . Los Angeles Times , March 16 2007 . Abdollah, T. Ensnared on the wireless Web. Los Angeles Times, March 16 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/986655.986668"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02)","author":"Balfanz D.","year":"2002","unstructured":"Balfanz , D. , Smetters , D. K. , Stewart , P. , and Wong , H. C . Talking to strangers: Authentication in ad-hoc wireless networks . In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02) (San Diego, CA , February 2002 ). Balfanz, D., Smetters, D. K., Stewart, P., and Wong, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02) (San Diego, CA, February 2002)."},{"key":"e_1_3_2_1_4_1","volume-title":"PC World","author":"Biba E.","year":"2005","unstructured":"Biba , E. Does your Wi-Fi hotspot have an evil twin ? PC World , March 15 2005 . Author writes for Medill New Service. Biba, E. Does your Wi-Fi hotspot have an evil twin? PC World, March 15 2005. Author writes for Medill New Service."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/188307.188361"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-540-39881-3_14","volume-title":"Proc. Conference on Security in Pervasive Computing (SPC'03)","volume":"2802","author":"Bussard L.","year":"2003","unstructured":"Bussard , L. , and Roudier , Y . Embedding distance-bounding protocols within intuitive interactions . In Proc. Conference on Security in Pervasive Computing (SPC'03) ( Mar. 2003 ), vol. 2802 of Lecture Notes in Computer Science, Springer Verlag , pp. 143 -- 156 . Bussard, L., and Roudier, Y. Embedding distance-bounding protocols within intuitive interactions. In Proc. Conference on Security in Pervasive Computing (SPC'03) (Mar. 2003), vol. 2802 of Lecture Notes in Computer Science, Springer Verlag, pp. 143--156."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. 1st Annual PKI Research Workshop (Gaithersburg","author":"Dohrmann S.","year":"2002","unstructured":"Dohrmann , S. , and Ellison , C . Public-key support for collaborative groups . In Proc. 1st Annual PKI Research Workshop (Gaithersburg , Mayland, USA , Apr. 2002 ), National Institute for Standards and Technology, pp. 139--148. Dohrmann, S., and Ellison, C. Public-key support for collaborative groups. In Proc. 1st Annual PKI Research Workshop (Gaithersburg, Mayland, USA, Apr. 2002), National Institute for Standards and Technology, pp. 139--148."},{"key":"e_1_3_2_1_8_1","volume-title":"January 20","author":"Fleishman G.","year":"2005","unstructured":"Fleishman , G. My evil twin. Published online at http:\/\/wifinetnews.com\/archives\/004718.html , January 20 2005 . Fleishman, G. My evil twin. Published online at http:\/\/wifinetnews.com\/archives\/004718.html, January 20 2005."},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Manual authentication for wireless devices","volume":"7","author":"Gehrmann C.","year":"2004","unstructured":"Gehrmann , C. , Mitchell , C. J. , and Nyberg , K . Manual authentication for wireless devices . RSA Cryptobytes 7 , 1 ( Jan. 2004 ), 29--37. Gehrmann, C., Mitchell, C. J., and Nyberg, K. Manual authentication for wireless devices. RSA Cryptobytes 7, 1 (Jan. 2004), 29--37.","journal-title":"RSA Cryptobytes"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_3_2_1_11_1","volume-title":"Apr.","author":"Group","year":"2007","unstructured":"Group , T. S. Airsnarf . Published online at http:\/\/airsnarf.shmoo.com , Apr. 2007 . Airsnarf is a simple wireless access point setup utility designed to demonstrate how a rogue access point can steal usernames and passwords from public wireless hotspots. Group, T. S. Airsnarf. Published online at http:\/\/airsnarf.shmoo.com, Apr. 2007. Airsnarf is a simple wireless access point setup utility designed to demonstrate how a rogue access point can steal usernames and passwords from public wireless hotspots."},{"key":"e_1_3_2_1_12_1","volume-title":"Internet Engineering Task Force","author":"Haller N.","year":"1998","unstructured":"Haller , N. , Metz , C. , Nesser , P. , and Straw , M . A one-time password system. Internet Request for Comments 2289 , Internet Engineering Task Force , Feb. 1998 . Haller, N., Metz, C., Nesser, P., and Straw, M. A one-time password system. Internet Request for Comments 2289, Internet Engineering Task Force, Feb. 1998."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785636"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935070_6"},{"key":"e_1_3_2_1_15_1","volume-title":"A technique for the measurement of attitudes","author":"Likert R.","year":"1932","unstructured":"Likert , R. A technique for the measurement of attitudes . McGraw-Hill , New York, USA , 1932 . Likert, R. A technique for the measurement of attitudes. McGraw-Hill, New York, USA, 1932."},{"key":"e_1_3_2_1_16_1","volume-title":"United States Patent and Trademark Office","author":"Maher D. P.","year":"1995","unstructured":"Maher , D. P. Secure communication method and apparatus. United states patent 5,450,493 , United States Patent and Trademark Office , Sept. 1995 . Filed Dec. 29, 1993. Maher, D. P. Secure communication method and apparatus. United states patent 5,450,493, United States Patent and Trademark Office, Sept. 1995. Filed Dec. 29, 1993."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_3_2_1_18_1","volume-title":"warns cranfield university","author":"Meadows H.","year":"2005","unstructured":"Meadows , H. \" Evil Twin \" hotspots are a new menace for internet users , warns cranfield university . Press release, Cranfield University , Cranfield, Bedfordshire, MK43 0AL, United Kingdom, Jan. 2005 . Available online at http:\/\/www.cranfield.ac.uk\/university\/press\/2005\/14012005.cfm. Meadows, H. \"Evil Twin\" hotspots are a new menace for internet users, warns cranfield university. Press release, Cranfield University, Cranfield, Bedfordshire, MK43 0AL, United Kingdom, Jan. 2005. Available online at http:\/\/www.cranfield.ac.uk\/university\/press\/2005\/14012005.cfm."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"e_1_3_2_1_20_1","volume-title":"Apr.","author":"Ornaghi A.","year":"2007","unstructured":"Ornaghi , A. , and Valleri , M. Ettercap . Available online at http:\/\/ettercap.sourceforge.net , Apr. 2007 . Ettercap is a network sniffer with extensive support for Man-in-the-Mddle Attacks . Ornaghi, A., and Valleri, M. Ettercap. Available online at http:\/\/ettercap.sourceforge.net, Apr. 2007. Ettercap is a network sniffer with extensive support for Man-in-the-Mddle Attacks."},{"key":"e_1_3_2_1_21_1","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99)","author":"Perrig A.","year":"1999","unstructured":"Perrig , A. , and Song , D . Hash visualization: a way to improve real world security . In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) ( 1999 ). Perrig, A., and Song, D. Hash visualization: a way to improve real world security. In International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) (1999)."},{"key":"e_1_3_2_1_22_1","volume-title":"Human-computer interaction with mobile devices and services (Mobile HCI 2003)","author":"Rekimoto J.","year":"2003","unstructured":"Rekimoto , J. , Ayatsuka , Y. , and Kohno , M . SyncTap: An interaction technique for mobile networking . In Human-computer interaction with mobile devices and services (Mobile HCI 2003) ( 2003 ), L. Chittaro , Ed ., no. 2795 in Lecture Notes in Computer Science, Springer Verlag, pp. 104--115. Rekimoto, J., Ayatsuka, Y., and Kohno, M. SyncTap: An interaction technique for mobile networking. In Human-computer interaction with mobile devices and services (Mobile HCI 2003) (2003), L. Chittaro, Ed., no. 2795 in Lecture Notes in Computer Science, Springer Verlag, pp. 104--115."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.877482"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"e_1_3_2_1_27_1","volume-title":"Designing the User Interface","author":"Shneiderman B.","year":"1998","unstructured":"Shneiderman , B. Designing the User Interface , 3 rd ed. Addison Wesley , 1998 . Shneiderman, B. Designing the User Interface, 3rd ed. Addison Wesley, 1998.","edition":"3"},{"key":"e_1_3_2_1_28_1","first-page":"172","volume-title":"Proc. 7th International Security Protocols Workshop","author":"Stajano F.","year":"1999","unstructured":"Stajano , F. , and Anderson , R. J . The resurrecting duckling: Security issues for ad-hoc wireless networks . In Proc. 7th International Security Protocols Workshop ( 1999 ), pp. 172 -- 194 . Stajano, F., and Anderson, R. J. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. 7th International Security Protocols Workshop (1999), pp. 172--194."},{"key":"e_1_3_2_1_30_1","volume-title":"VNU Business Publications","author":"Thomson I.","year":"2006","unstructured":"Thomson , I. \" Evil Twin \" Wi-Fi hacks target the rich . VNU Business Publications , November 23 2006 . Available online at http:\/\/www.vnunet.com\/2169400. Thomson, I. \"Evil Twin\" Wi-Fi hacks target the rich. VNU Business Publications, November 23 2006. Available online at http:\/\/www.vnunet.com\/2169400."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785635"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_19"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862475"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02447"}],"event":{"name":"WISEC '08: First ACM Conference on Wireless Network Security","location":"Alexandria VA USA","acronym":"WISEC '08","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the first ACM conference on Wireless network security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352533.1352569","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352533.1352569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:20Z","timestamp":1750253960000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352533.1352569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,31]]},"references-count":33,"alternative-id":["10.1145\/1352533.1352569","10.1145\/1352533"],"URL":"https:\/\/doi.org\/10.1145\/1352533.1352569","relation":{},"subject":[],"published":{"date-parts":[[2008,3,31]]},"assertion":[{"value":"2008-03-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}