Author:
Holman J.,Lazar J.,Feng J.
Reference6 articles.
1. D’Arcy J, Feng J (2006) Investigating security-related behaviors among computer users with motor impairments. In: Poster abstract at Symposium On Usable Privacy and Security (SOUPS 06), Pittsburgh, PA, US. Available at: http://cups.cs.cmu.edu/soups/2006/posters/darcy-poster_abstract.pdf (Accessed on 10 March 2007)
2. Johnston J, Eloff J, Labuschagne L (2003) Security and human computer interfaces. Computers and Security, 22(8): 675–684
3. Robinson S (2002) Human or computer? Take this test. Available at: http://query.nytimes.com/gst/fullpage.html?res=9907E5DF163AF933A25751C1A9649C8B63 (Accessed on 17 March 2007)
4. Sasse MA, Brostoff S, Weirich D (2001) Transforming the weakest link — a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3): 122–130
5. von Ahn L, Blum M, Hopper N, Langford J (2003) CAPTCHA: using hard AI problems for security. Available at: www.cs.cmu.edu/~biglou/captcha_crypt.pdf (Accessed on 3 April 2007)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献