Speech Privacy Technophobes Need Not Apply
IEEE Security and Privacy
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Security assessments of IEEE 802.15.4 standard based on X.805 framework
International Journal of Security and Networks
On designing usable and secure recognition-based graphical authentication mechanisms
Interacting with Computers
An empirical study of visual security cues to prevent the SSLstripping attack
Proceedings of the 27th Annual Computer Security Applications Conference
Policy-driven memory protection for reconfigurable hardware
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Hi-index | 0.00 |
In the security community, weýve always recognized that our security proposals come with certain costs in terms of usability. Traditionally, thatýs the compromise we make to get security. But the market has ruled against us. Time and time again, our fielded secure systems are ignored, bypassed, turned off, or constrained to such a small part of the process that the security result is practically nonexistent. Even worse for our mental self-satisfaction, those systems that claim to deliver security to users simply donýt pass muster--theyýre not what weýd like to think of as secure systems.