Three Challenges for Embedding Security into Applications
暂无分享,去创建一个
[1] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[2] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[3] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[4] Diana K. Smetters,et al. Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.
[5] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[6] Mark W. Newman,et al. Using speakeasy for ad hoc peer-to-peer collaboration , 2002, CSCW '02.
[7] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[8] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.