Author:
Germanakos Panagiotis,Belk Marios
Publisher
Springer International Publishing
Reference97 articles.
1. Adams A, Sasse A (1999) Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Commun ACM 42(12):40–46
2. Albert D, Jeng B, Tseng C, Wang J (2010) A study of CAPTCHA and its application to user authentication. In: Proceedings of the international conference on computational collective intelligence (ICCCI 2010), Springer, Berlin/Heidelberg, pp 433–440
3. Altun A, Cakan M (2006) Undergraduate students’ academic achievement, field dependent/independent cognitive styles and attitude toward computers. Educ Technol Soc 9(1):289–297
4. Angeli AD, Coventry L, Johnson G, Renaud K (2005) Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems. Int J Hum Comput Stud 63(1–2):128–152
5. LNCS;P Baecher,2011