Computer communications security: principles, standard protocols and techniques
Computer communications security: principles, standard protocols and techniques
Restating the Foundation of Information Security
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
Taming the wolf in sheep's clothing: privacy in multimedia communications
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Biometrics — Real Identities for a Virtual World
BT Technology Journal
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Digital Libraries in Academia: Challenges and Changes
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
User Interaction Design for Secure Systems
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Digital Libraries in a Clinical Setting: Friend or Foe?
ECDL '01 Proceedings of the 5th European Conference on Research and Advanced Technology for Digital Libraries
Revised Papers from the 8th International Workshop on Security Protocols
Denial of Access in Biometrics-Based Authentication Systems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Design and usability in security systems: daily life as a context of use?
ACM SIGCSE Bulletin
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
The researcher's dilemma: evaluating trust in computer-mediated communication
International Journal of Human-Computer Studies - Special issue: Trust and technology
Humanware issues in a government management information systems implementation
Annals of cases on information technology
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Bringing security home: a process for developing secure and usable systems
Proceedings of the 2003 workshop on New security paradigms
Proceedings of the 2003 workshop on New security paradigms
Guest Editors' Introduction: Secure or Usable?
IEEE Security and Privacy
In Search of Usable Security: Five Lessons from the Field
IEEE Security and Privacy
Password Memorability and Security: Empirical Results
IEEE Security and Privacy
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Building security and trust in online banking
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Omnivore: risk management through bidirectional transparency
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Social empowerment and exclusion: A case study on digital libraries
ACM Transactions on Computer-Human Interaction (TOCHI)
Using Mobile Phones for Secure, Distributed Document Processing in the Developing World
IEEE Pervasive Computing
Authentication using graphical passwords: effects of tolerance and image choice
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Mechanisms for increasing the usability of grid security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
PassPoints: design and longitudinal evaluation of a graphical password system
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Bridging the gap between organizational and user perspectives of security in the clinical domain
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
The trouble with login: on usability and computer security in ubiquitous computing
Personal and Ubiquitous Computing
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Improving interface designs to help users choose better passwords
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Minimal-feedback hints for remembering passwords
interactions - A contradiction in terms?
Security and usability: the case of the user authentication methods
IHM '06 Proceedings of the 18th International Conferenceof the Association Francophone d'Interaction Homme-Machine
Design and evaluation of a shoulder-surfing resistant graphical password scheme
Proceedings of the working conference on Advanced visual interfaces
Intentional access management: making access control usable for end-users
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Human selection of mnemonic phrase-based passwords
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
The usability of passphrases for authentication: An empirical field study
International Journal of Human-Computer Studies
Question-based group authentication
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
Pictures at the ATM: exploring the usability of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Password sharing: implications for security design based on social practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A large-scale study of web password habits
Proceedings of the 16th international conference on World Wide Web
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Bayesian Networks for Knowledge-Based Authentication
IEEE Transactions on Knowledge and Data Engineering
Detecting Cognitive Causes of Confidentiality Leaks
Electronic Notes in Theoretical Computer Science (ENTCS)
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
SPP: An anti-phishing single password protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling user choice in the PassPoints graphical password scheme
Proceedings of the 3rd symposium on Usable privacy and security
Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security
Helping users create better passwords: is this the right approach?
Proceedings of the 3rd symposium on Usable privacy and security
Privacy implications for single sign-on authentication in a hospital environment
Proceedings of the 3rd symposium on Usable privacy and security
The Journal of Strategic Information Systems
Password policy simulation and analysis
Proceedings of the 2007 ACM workshop on Digital identity management
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Attitudes and practices of students towards password security
Journal of Computing Sciences in Colleges
Towards a framework for security analysis of multiple password schemes
Proceedings of the 1st European Workshop on System Security
Biometric daemons: authentication via electronic pets
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Human-in-the-loop: rethinking security in mobile and pervasive systems
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Memorability of persuasive passwords
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Integrating security and usability into the requirements and design process
International Journal of Electronic Security and Digital Forensics
Do strong web passwords accomplish anything?
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
Security and privacy system architecture for an e-hospital environment
Proceedings of the 7th symposium on Identity and trust on the Internet
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
A framework for reasoning about the human in the loop
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Biometric daemons: authentication via electronic pets
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
RUST: a retargetable usability testbed for website authentication technologies
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Understanding user perspectives on biometric technology
Communications of the ACM - Enterprise information integration: and other tools for merging data
Improving text passwords through persuasion
Proceedings of the 4th symposium on Usable privacy and security
Securing passfaces for description
Proceedings of the 4th symposium on Usable privacy and security
Proceedings of the 4th symposium on Usable privacy and security
Persuasion for Stronger Passwords: Motivation and Pilot Study
PERSUASIVE '08 Proceedings of the 3rd international conference on Persuasive Technology
Secure localised storage based on super-distributed RFID-tag infrastructures
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Family accounts: a new paradigm for user accounts within the home environment
Proceedings of the 2008 ACM conference on Computer supported cooperative work
PassShapes: utilizing stroke based authentication to increase password memorability
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Network authentication using single sign-on: the challenge of aligning mental models
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Information Security management: A human challenge?
Information Security Tech. Report
International Journal of Human-Computer Studies
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Beyond the Dyad: understanding sharing in instant messaging
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Lessons from brain age on persuasion for computer security
CHI '09 Extended Abstracts on Human Factors in Computing Systems
A user friendly password authenticated key agreement for multi server environment
Proceedings of the International Conference on Advances in Computing, Communication and Control
mFerio: the design and evaluation of a peer-to-peer mobile payment system
Proceedings of the 7th international conference on Mobile systems, applications, and services
VIP: a visual approach to user authentication
Proceedings of the Working Conference on Advanced Visual Interfaces
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
The user is not the enemy: fighting malware by tracking user intentions
Proceedings of the 2008 workshop on New security paradigms
The compliance budget: managing security behaviour in organisations
Proceedings of the 2008 workshop on New security paradigms
Proceedings of the 2008 workshop on New security paradigms
Security and usability: the gap in real-world online banking
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Position: the user is the enemy
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Visual passwords: cure-all or snake-oil?
Communications of the ACM - Finding the Fun in Computer Science Education
Exploring the Use of Discrete Gestures for Authentication
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
THE WAY I SEE IT: When security gets in the way
interactions - Catalyzing a Perfect Storm
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Multiple password interference in text passwords and click-based graphical passwords
Proceedings of the 16th ACM conference on Computer and communications security
Mixed-initiative security agents
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Feasibility study of tactile-based authentication
International Journal of Human-Computer Studies
Building a better password: the role of cognitive load in information security training
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
So long, and no thanks for the externalities: the rational rejection of security advice by users
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Interacting with Computers
Using reinforcement to strengthen users' secure behaviors
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The true cost of unusable password policies: password use in the wild
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ColorPIN: securing PIN entry through indirect input
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Teaching Johnny not to fall for phish
ACM Transactions on Internet Technology (TOIT)
Users and trust: the new threats, the new possibilities
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: applications and services
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The effects of human interaction on biometric system performance
ICDHM'07 Proceedings of the 1st international conference on Digital human modeling
A sense of security in pervasive computing: is the light on when the refrigerator door is closed?
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
PassPattern system (PPS): a pattern-based user authentication scheme
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
A meta-model for usable secure requirements engineering
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Using modelling and simulation for policy decision support in identity management
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Password strength: an empirical analysis
INFOCOM'10 Proceedings of the 29th conference on Information communications
Optimizing a policy authoring framework for security and privacy policies
Proceedings of the Sixth Symposium on Usable Privacy and Security
Where do security policies come from?
Proceedings of the Sixth Symposium on Usable Privacy and Security
Folk models of home computer security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Towards understanding ATM security: a field study of real world ATM use
Proceedings of the Sixth Symposium on Usable Privacy and Security
Secure and usable P2P VoIP for mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Secure passwords through enhanced hashing
LISA'09 Proceedings of the 23rd conference on Large installation system administration
On the design of a "moody" keyboard
Proceedings of the 8th ACM Conference on Designing Interactive Systems
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
The security of modern password expiration: an algorithmic framework and empirical analysis
Proceedings of the 17th ACM conference on Computer and communications security
QoS-T: QoS throttling to elicit user cooperation in computer systems
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Towards inclusive identity management
Identity in the Information Society
Proceedings of the 2010 workshop on New security paradigms
A billion keys, but few locks: the crisis of web single sign-on
Proceedings of the 2010 workshop on New security paradigms
Proceedings of the 2010 workshop on New security paradigms
Information security governance: integrating security into the organizational culture
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
Interacting with Computers
Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
inTUIt: simple identification on tangible user interfaces
Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
More than skin deep: measuring effects of the underlying model on access-control system usability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Persona cases: a technique for grounding personas
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Experiencing security in interaction design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
MARASIM: a novel jigsaw based authentication scheme using tagging
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A diary study of password usage in daily life
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Medical record privacy: is it a facade?
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Using and managing multiple passwords: A week to a view
Interacting with Computers
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Healthcare and security: understanding and evaluating the risks
EHAWC'11 Proceedings of the 2011th international conference on Ergonomics and health aspects of work with computers
A comparative usability evaluation of traditional password managers
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Influencing mental models of security: a research agenda
Proceedings of the 2011 workshop on New security paradigms workshop
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
What makes users refuse web single sign-on?: an empirical investigation of OpenID
Proceedings of the Seventh Symposium on Usable Privacy and Security
Breaking undercover: exploiting design flaws and nonuniform human behavior
Proceedings of the Seventh Symposium on Usable Privacy and Security
An authentication scheme based upon face recognition for the mobile environment
CIS'04 Proceedings of the First international conference on Computational and Information Science
Analysis and design of graphical password techniques
ISVC'06 Proceedings of the Second international conference on Advances in Visual Computing - Volume Part II
Improving usability through password-corrective hashing
SPIRE'06 Proceedings of the 13th international conference on String Processing and Information Retrieval
Evaluating the usability and security of a graphical one-time PIN system
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Barry is not the weakest link: eliciting secure system requirements with personas
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Phoolproof phishing prevention
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
International Journal of Human-Computer Studies
Website credential storage and two-factor web authentication with a java SIM
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
SP'11 Proceedings of the 19th international conference on Security Protocols
WebTicket: account management using printable tokens
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
International Journal of Human-Computer Studies
Eighty something: banking for the older old
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
An enhanced drawing reproduction graphical password strategy
Journal of Computer Science and Technology - Special issue on Natural Language Processing
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
An empirical investigation into how users adapt to mobile phone auto-locks in a multitask setting
MobileHCI '12 Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services
Investigating authentication methods used by individuals with down syndrome
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Exploring user preferences for privacy interfaces in mobile sensing applications
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
Video-passwords: advertising while authenticating
Proceedings of the 2012 workshop on New security paradigms
A framework for modelling security architectures in services ecosystems
ESOCC'12 Proceedings of the First European conference on Service-Oriented and Cloud Computing
Cracking associative passwords
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Building better passwords using probabilistic techniques
Proceedings of the 28th Annual Computer Security Applications Conference
Biometric authentication on a mobile device: a study of user effort, error and task disruption
Proceedings of the 28th Annual Computer Security Applications Conference
Understanding the weaknesses of human-protocol interaction
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Preventing the revealing of online passwords to inappropriate websites with logininspector
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
The usability of truecrypt, or how i learned to stop whining and fix an interface
Proceedings of the third ACM conference on Data and application security and privacy
A study of user password strategy for multiple accounts
Proceedings of the third ACM conference on Data and application security and privacy
Proceedings of the third ACM conference on Data and application security and privacy
Pre-Service Teachers' Perceptions of Information Assurance and Cyber Security
International Journal of Information and Communication Technology Education
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
Managing access control for things: a capability based approach
Proceedings of the 7th International Conference on Body Area Networks
Making graphic-based authentication secure against smudge attacks
Proceedings of the 2013 international conference on Intelligent user interfaces
Age-related performance issues for PIN and face-based authentication systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Does my password go up to eleven?: the impact of password meters on password selection
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Transactions on Accessible Computing (TACCESS)
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Exploring capturable everyday memory for autobiographical authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Cost-benefit analysis of digital rights management products using stochastic models
Proceedings of the 46th Annual Simulation Symposium
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
On the ecological validity of a password study
Proceedings of the Ninth Symposium on Usable Privacy and Security
Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software
Pitfalls in the automated strengthening of passwords
Proceedings of the 29th Annual Computer Security Applications Conference
Journal of Organizational and End User Computing
Trustworthy and inclusive identity management for applications in social media
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Journal of Organizational and End User Computing
Investigating Users’ Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
ACM Transactions on Internet Technology (TOIT)
Can we sell security like soap?: a new approach to behaviour change
Proceedings of the 2013 workshop on New security paradigms workshop
eHealth in Denmark: A Case Study
Journal of Medical Systems
Hi-index | 48.22 |