Security und Usability
暂无分享,去创建一个
[1] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[2] Simson L. Garfinkel,et al. How to make secure email easier to use , 2005, CHI.
[3] Ka-Ping Yee,et al. Guidelines and Strategies for Secure Interaction Design , 2005 .
[4] Rob Miller,et al. Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce , 2005, Financial Cryptography.
[5] Hannes Tschofenig,et al. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) , 2005, RFC.
[6] Diana K. Smetters,et al. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.
[7] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[8] Michael A. Caloyannides,et al. Privacy Protection and Computer Forensics, Second Edition , 2004 .
[9] G. Lakoff,et al. Women, Fire, and Dangerous Things: What Categories Reveal about the Mind , 1988 .
[10] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.