Taming the wolf in sheep's clothing: privacy in multimedia communications
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Pretty good persuasion: a first step towards effective password security in the real world
Proceedings of the 2001 workshop on New security paradigms
Users' perception of privacy in multimedia communication
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Why Value Is Everything: A User-Centered Approach to Internet Quality of Service and Pricing
IWQoS '01 Proceedings of the 9th International Workshop on Quality of Service
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Spy-resistant keyboard: more secure password entry on public touch screen displays
OZCHI '05 Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future
Improving interface designs to help users choose better passwords
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Question-based group authentication
OZCHI '06 Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments
The design and implementation of background Pass-Go scheme towards security threats
WSEAS Transactions on Information Science and Applications
Background pass-go (BPG), a new approach for GPS
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
An information security ontology incorporating human-behavioural implications
Proceedings of the 2nd international conference on Security of information and networks
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
ICEbox: toward easy-to-use home networking
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
A mobile network operator-independent mobile signature service
Journal of Network and Computer Applications
Of passwords and people: measuring the effect of password-composition policies
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Secure mobile sales force automation: the case of independent sales agencies
Information Systems and e-Business Management
Pictures or questions?: examining user responses to association-based authentication
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Metrics of password management policy
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
International Journal of Human-Computer Studies
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Correct horse battery staple: exploring the usability of system-assigned passphrases
Proceedings of the Eighth Symposium on Usable Privacy and Security
How does your password measure up? the effect of strength meters on password creation
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Hi-index | 0.00 |