IKM-based Security Usability Enhancement Model
暂无分享,去创建一个
[1] Simson L. Garfinkel,et al. Design principles and patterns for computer systems that are simultaneously secure and usable , 2005 .
[2] Sig Porter,et al. A password extension for improved human factors , 1982, Comput. Secur..
[3] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[4] Nasir D. Memon,et al. Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.
[5] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[6] Adrian Perrig,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .
[7] Hossein Rouhani Zeidanloo,et al. Node Based Interpretative Key Management Framework , 2010, Security and Management.
[8] Mazdak Zamani,et al. Security Features Comparison of Master Key and IKM Cryptographic Key Management for Researchers and Developers , 2011 .
[9] Moshe Zviran,et al. Cognitive passwords: The key to easy access control , 1990, Comput. Secur..
[10] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[11] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[12] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[13] Hossein Rouhani Zeidanloo,et al. Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.
[14] Saman Shojae Chaeikar,et al. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks , 2012 .