1. Anderson, R., Stajano, F., Lee, J.-H.: Security policies. In: Advances in Computers, vol. 55, Academic Press, London (2001)
2. Anti-Phishing Working Group (APWG). Phishing activity trends report (June 2005),
http://antiphishing.org/
3. Balfanz, D., Felton, E.: Hand-held computers can be better smart cards. In: Proceedings of USENIX Security (1999)
4. Berger, S., Kjeldsen, R., Narayanaswami, C., Pinhanez, C., Podlaseck, M., Raghunath, M.: Using symbiotic displays to view sensitive information in public. In: Proceedings of PERCOM, IEEE, Los Alamitos (2005)
5. Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: Proceedings of ACM CSCW (2000)