Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Aligning Security and Usability
IEEE Security and Privacy
On predictive models and user-drawn graphical passwords
ACM Transactions on Information and System Security (TISSEC)
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Towards security policy decisions based on context profiling
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Proceedings of the first ACM conference on Data and application security and privacy
PassChords: secure multi-touch authentication for blind people
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Hi-index | 0.00 |
We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to mobile security problems.