Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security
暂无分享,去创建一个
Sacha Brostoff | Martina Angela Sasse | Dirk Weirich | M. Sasse | Dirk Weirich | S. Brostoff | Sacha Brostoff
[1] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[2] Yishay Spector,et al. Pass-sentence - a new approach to computer code , 1994, Comput. Secur..
[3] M Rejman-Greene. Biometrics — Real Identities for a Virtual World , 2001 .
[4] M. Angela Sasse,et al. Safe and sound: a safety-critical approach to security , 2001, NSPW '01.
[5] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[6] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[7] Moshe Zviran,et al. A Comparison of Password Techniques for Multilevel Authentication Mechanisms , 1990, Comput. J..
[8] M. Angela Sasse,et al. Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.
[9] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[10] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[11] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[12] Bruce Schneier,et al. Protecting secret keys with personal entropy , 2000, Future Gener. Comput. Syst..
[13] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[14] Moshe Zviran,et al. Cognitive passwords: The key to easy access control , 1990, Comput. Secur..
[15] James A. Haskett,et al. Pass-algorithms: a user validation scheme based on knowledge of secret algorithms , 1984, CACM.