Author:
Roth Volker,Straub Tobias,Richter Kai
Subject
Hardware and Architecture,Human-Computer Interaction,General Engineering,Education,Human Factors and Ergonomics,Software
Reference36 articles.
1. Anderson, J., 1973. Information security in a multi-user computer environment. Advances in Computers. Academic Press, New York, pp. 1–35.
2. Fortifying key negotiation schemes with poorly chosen passwords;Anderson;Electronics Letters,1994
3. Arkko, J., Nikander, P., 2002. How to authenticate unknown principals without trusted parties. In: Proceedings of the Security Protocols Workshop 2002, Cambridge, UK, April 2002.
4. Balfanz, D., 2003. Usable access control for the world wide web. In: Proceedings of the 19th Annual Computer Security Applications Conference. IEEE, New York, pp. 406–415.
5. In search of usable security: five lessons from the field;Balfanz;IEEE Security and Privacy,2004
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献