Subject
Hardware and Architecture,Human-Computer Interaction,General Engineering,Education,Human Factors and Ergonomics,Software
Reference39 articles.
1. Users are not the enemy: why users compromise security mechanisms and how to take remedial measures;Adams;Communications of the ACM,1999
2. Brostoff, S., Sasse, M.A., 2000. Are Pass Faces™ more usable than passwords? A field trial investigation. In: Proceedings of the HCI’00, pp. 405–424.
3. Data Protection Act, 1998. (Chapter 29). Available from: 〈http://www.hmso.go-v.uk/acts/acts1998/19980029.htm〉 accessed 27.03.09.
4. De Angeli, A., Coutts, M., Coventry, L., Cameron, D., Johnson, G.I., Fischer, M., 2002. VIP: a visual approach to user authentication. In: Proceedings of the Working Conference on Advanced Visual Inter-faces, pp. 316–323.
5. Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems;De Angeli;International Journal of Human–Computer Studies,2005
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献