메뉴 건너뛰기




Volumn 2, Issue 5, 2004, Pages 16-18

Secure or usable?

Author keywords

[No Author keywords available]

Indexed keywords

CHALLENGE-QUESTION SYSTEMS; PASSWORDS; USABILITY; USER AUTHENTICATION;

EID: 12844259531     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.69     Document Type: Review
Times cited : (47)

References (5)
  • 1
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. Saltzer and M. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, vol. 63, no. 9, 1975, pp. 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 2
    • 0020112113 scopus 로고
    • Design rules based on analyses of human error
    • D. Norman, "Design Rules Based on Analyses of Human Error," Comm. ACM, vol. 26, no. 4, 1983, pp. 254-258.
    • (1983) Comm. ACM , vol.26 , Issue.4 , pp. 254-258
    • Norman, D.1
  • 3
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Usenix Assoc.
    • A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th Usenix Security Symp., Usenix Assoc., 1999, pp. 169-184.
    • (1999) Proc. 8th Usenix Security Symp. , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 4
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M.A. Sasse, "Users Are Not the Enemy," Comm. ACM, vol. 42, no. 12, 1999, pp. 41-46.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.