Author:
Llewellyn-Jones David,Jenkinson Graeme,Stajano Frank
Publisher
Springer International Publishing
Reference10 articles.
1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999). http://doi.acm.org/10.1145/322796.322806
2. Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 64–75. ACM (2007)
3. CESG: Password guidance: simplifying your approach. CESG, CPNI, January 2016. https://www.cesg.gov.uk/guidance/password-guidance-simplifying-your-approach
4. Christianson, B.: Living in an impossible world: real-izing the consequences of intransitive trust. Philos. Technol. 26(4), 411–429 (2013)
5. Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation, pp. 167–176. IEEE, August 2005