Authentication interface evaluation and design for mobile devices
暂无分享,去创建一个
[1] Cristian S. Calude,et al. Discrete Mathematics and Theoretical Computer Science , 2003, Lecture Notes in Computer Science.
[2] Yvonne Rogers,et al. Interaction Design: Beyond Human-Computer Interaction , 2002 .
[3] Angela Sasse,et al. Humans in the Loop Human – Computer Interaction and Security , 2022 .
[4] Yvonne Rogers,et al. Beyond Interaction Design: Beyond Human-Computer Interaction , 2001 .
[5] Austin Henderson,et al. Interaction design: beyond human-computer interaction , 2002, UBIQ.
[6] Audun Jøsang,et al. Authentication for Humans , 2001 .
[7] Lorrie Faith,et al. Secure or Usable , 2004 .
[8] Ka-Ping Yee,et al. Aligning Security and Usability , 2004, IEEE Secur. Priv..
[9] Chris Hofstader. Internet Accessibility: Beyond Disability , 2004, Computer.
[10] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[11] Lorrie Faith Cranor,et al. Guest Editors' Introduction: Secure or Usable? , 2004, IEEE Secur. Priv..
[12] Robin Jeffries,et al. User interface evaluation in the real world: a comparison of four techniques , 1991, CHI.
[13] C. D. Sutton,et al. Generational differences: revisiting generational work values for the new millennium , 2002 .
[14] Diana K. Smetters,et al. Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.
[15] Rosabeth Moss Kanter,et al. Evolve! : Succeeding in the Digital Culture of Tomorrow , 2001 .
[16] Diana K. Smetters,et al. In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.
[17] Simson L. Garfinkel,et al. Secure Web Authentication with Mobile Phones , 2004 .
[18] Izak Benbasat,et al. Interface design for mobile commerce , 2003, CACM.