-
1
-
-
14844325618
-
-
July
-
http://www.swiveltechnologies.com, July 2004.
-
(2004)
-
-
-
2
-
-
14844282631
-
-
July
-
http://www.hirschelectronics.com/Products_ScramblePads.asp, July 2004.
-
(2004)
-
-
-
3
-
-
14844287484
-
-
Passfaces. Apr.
-
Passfaces. www.realuser.com, Apr. 2004.
-
(2004)
-
-
-
6
-
-
14844287840
-
Shoulder-surfing automated
-
Apr.
-
BRADER, M. Shoulder-surfing automated. Risks Digest 19.70, Apr. 1998.
-
(1998)
Risks Digest 19.70
-
-
Brader, M.1
-
7
-
-
14844327456
-
Chemical combinatorial attacks on keyboards
-
BRIER, E., NACCACHE, D., AND PAILLIER, P. Chemical combinatorial attacks on keyboards. International Association for Cryptographic Research ePrint Archive 2003, 217 (2003).
-
(2003)
International Association for Cryptographic Research EPrint Archive 2003
, vol.217
-
-
Brier, E.1
Naccache, D.2
Paillier, P.3
-
8
-
-
0002020833
-
A quick and dirty usability scale
-
P. Jordan, B. Thomas, B. Weerdmeester, and I. McClelland, Eds. Taylor and Francis, London
-
BROOKE, J. SUS: A quick and dirty usability scale. In Usability evaluation in industry, P. Jordan, B. Thomas, B. Weerdmeester, and I. McClelland, Eds. Taylor and Francis, London, 1996, pp. 189-194.
-
(1996)
Usability Evaluation in Industry
, pp. 189-194
-
-
Sus, B.J.1
-
9
-
-
14844292015
-
Atm scam netted $620,000 australian
-
Aug.
-
COLVILLE, J. Atm scam netted $620,000 australian. Risks Digest 22.85, Aug. 2003.
-
(2003)
Risks Digest 22.85
-
-
Colville, J.1
-
10
-
-
14844315858
-
Card-o-rama: Magnetic stripe technology and beyond
-
COUNT ZERO. Card-o-rama: Magnetic stripe technology and beyond. Phrack, 37 (1992).
-
(1992)
Phrack
, vol.37
-
-
Zero, C.1
-
11
-
-
85084161493
-
Déjà vu: A user study using images for authentication
-
Denver, CO, USA, Aug.
-
DHAMIJA, R., AND PERRIG, A. Déjà vu: A user study using images for authentication. In Proc. 9th USENIX Security Symposium (Denver, CO, USA, Aug. 2000).
-
(2000)
Proc. 9th USENIX Security Symposium
-
-
Dhamija, R.1
Perrig, A.2
-
12
-
-
0242696305
-
An approach to usable security based on event monitoring and visualization
-
Virginia Beach, VA, USA, Sept., ACM
-
DOURISH, P., AND REDMILES, D. An approach to usable security based on event monitoring and visualization. In Proc. New Security Paradigms Workshop (Virginia Beach, VA, USA, Sept. 2002), ACM, pp. 75-81.
-
(2002)
Proc. New Security Paradigms Workshop
, pp. 75-81
-
-
Dourish, P.1
Redmiles, D.2
-
13
-
-
14844324416
-
A secure human-computer authentication scheme
-
School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May
-
HOPPER, N. J., AND BLUM, M. A secure human-computer authentication scheme. Technical Report CMU-CS-00-139, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May 2000.
-
(2000)
Technical Report
, vol.CMU-CS-00-139
-
-
Hopper, N.J.1
Blum, M.2
-
14
-
-
70349284581
-
Secure human identification protocols
-
ASIACRYPT (2001), C. Boyd, Ed., Springer Verlag
-
HOPPER, N. J., AND BLUM, M. Secure human identification protocols. In ASIACRYPT (2001), C. Boyd, Ed., vol. 2249 of Lecture Notes in Computer Science, Springer Verlag, pp. 52-66.
-
Lecture Notes in Computer Science
, vol.2249
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
17
-
-
0042044284
-
Practical human-machine identification over insecure channels
-
LI, X.-Y., AND TENG, S.-H. Practical human-machine identification over insecure channels. Journal of Combinatorial Optimization 3, 4 (1999).
-
(1999)
Journal of Combinatorial Optimization
, vol.3
, pp. 4
-
-
Li, X.-Y.1
Teng, S.-H.2
-
18
-
-
84995399871
-
Human identification through insecure channel
-
EUROCRYPT (1991), D. W. Davies, Ed., Springer Verlag
-
MATSUMOTO, T., AND IMAI, H. Human identification through insecure channel. In EUROCRYPT (1991), D. W. Davies, Ed., vol. 547 of Lecture Notes in Computer Science, Springer Verlag, pp. 409-421.
-
Lecture Notes in Computer Science
, vol.547
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
19
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
MILLER, G. A. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63 (1956), 81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
20
-
-
14844300740
-
-
Feb. Manuscript
-
MÖLLER, B. Schwächen des ec-PIN-Verfahrens. Available at http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller, Feb. 1997. Manuscript.
-
(1997)
Schwächen Des Ec-PIN-Verfahrens.
-
-
Möller, B.1
-
24
-
-
4243298488
-
-
Psychodiagnostisches Zentrum, Dresden, Germany
-
PLATH, H.-E., AND RICHTER, P. Ermüdungs-Monotonie-Sättigung- Stress (BMS). Tech. rep., Psychodiagnostisches Zentrum, Dresden, Germany, 1984.
-
(1984)
Ermüdungs-Monotonie-Sättigung-Stress (BMS). Tech. Rep.
-
-
Plath, H.-E.1
Richter, P.2
-
26
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
Virginia Beach, VA, USA, Sept., ACM
-
SMETTERS, D. K., AND GRINTER, R. E. Moving from the design of usable security technologies to the design of useful secure applications. In Proceedings of the New Security Paradigms Workshop (Virginia Beach, VA, USA, Sept. 2002), ACM, pp. 82-89.
-
(2002)
Proceedings of the New Security Paradigms Workshop
, pp. 82-89
-
-
Smetters, D.K.1
Grinter, R.E.2
-
27
-
-
0039068594
-
Authenticating users by word association
-
SMITH, S. L. Authenticating users by word association. Computers & Security 6 (1987), 464-470.
-
(1987)
Computers & Security
, vol.6
, pp. 464-470
-
-
Smith, S.L.1
-
28
-
-
0028406329
-
Pass-sentence - A new approach to computer code
-
SPECTOR, Y., AND GINZBERG, J. Pass-sentence - a new approach to computer code. Computers & Security 13 (1994), 145-160.
-
(1994)
Computers & Security
, vol.13
, pp. 145-160
-
-
Spector, Y.1
Ginzberg, J.2
-
31
-
-
14844310900
-
User-centered security engineering
-
Helsinki, Finland, Feb.
-
TOM MARKOTTEN, D. G. User-centered security engineering. In Proc. 4th NordU Conference (Helsinki, Finland, Feb. 2002).
-
(2002)
Proc. 4th NordU Conference
-
-
Tom Markotten, D.G.1
-
32
-
-
1942455789
-
Neural activity predicts individual differences in visual working memory capacity
-
Apr.
-
VOGEL, E. K., AND MACHIZAWA, M. G. Neural activity predicts individual differences in visual working memory capacity. Nature 428 (Apr. 2004), 748-751.
-
(2004)
Nature
, vol.428
, pp. 748-751
-
-
Vogel, E.K.1
Machizawa, M.G.2
-
35
-
-
14844281996
-
-
Method and apparatus for secure PIN entry. US Patent #5,940,511, United States Patent and Trademark Office, May. Assignee: Lucent Technologies, Inc. (Murray Hill, NJ)
-
WILFONG, G. T. Method and apparatus for secure PIN entry. US Patent #5,940,511, United States Patent and Trademark Office, May 1997. Assignee: Lucent Technologies, Inc. (Murray Hill, NJ).
-
(1997)
-
-
Wilfong, G.T.1
-
36
-
-
14844289174
-
Spain uncovers hi-tech cashpoint fraud
-
Jan.
-
WOOD, D. Spain uncovers hi-tech cashpoint fraud. BBC News Online, Jan. 2003.
-
(2003)
BBC News Online
-
-
Wood, D.1
-
37
-
-
84944056366
-
User interaction design for secure systems
-
Proc. 4th International Conference on Information and Communications Security Singapore, Dec., R. Deng, S. Qing, F. Bao, and J. Zhou, Eds., Springer Verlag. ISBN 3-540-00164-6
-
YEE, K.-P. User interaction design for secure systems. In Proc. 4th International Conference on Information and Communications Security (Singapore, Dec. 2002), R. Deng, S. Qing, F. Bao, and J. Zhou, Eds., vol. 2513 of Lecture Notes in Computer Science, Springer Verlag, pp. 278-290. ISBN 3-540-00164-6.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 278-290
-
-
Yee, K.-P.1
-
38
-
-
0025545602
-
Cognitive passwords: The key to easy access control
-
ZVIRAN, M., AND HAGA, W. J. Cognitive passwords: The key to easy access control. Computers & Security 9 (1990), 723-736.
-
(1990)
Computers & Security
, vol.9
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
|