User-Centered Security Engineering
暂无分享,去创建一个
[1] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[2] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[3] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[4] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[5] Daniela Gerd tom Markotten,et al. Usability meets security - the Identity-Manager as your personal security assistant for the Internet , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[6] Daniela Gerd tom Markotten,et al. Benutzbare Sicherheit — Herausforderungen und Modell für E-Commerce-Systeme , 2000, Wirtschaftsinf..
[7] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[8] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[9] Ben Shneiderman,et al. Designing The User Interface , 2013 .
[10] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.