메뉴 건너뛰기




Volumn 1, Issue 3, 2003, Pages 75-79

Humans in the loop: Human-computer interaction and security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER DESIGNS; INFRASTRUCTURES; MULTILEVEL SECURITY SYSTEMS (MLS); PASSWORD AUTHENTICATION; PUBLIC KEY INFRASTRUCTURE (PKI);

EID: 3042740017     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSECP.2003.1203228     Document Type: Review
Times cited : (52)

References (9)
  • 2
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Usenix Assoc.
    • A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th Usenix Sec. Symp., Usenix Assoc., 1999; www-2.cs.cmu.edu/~alma/johnny.pdf.
    • (1999) Proc. 8th Usenix Sec. Symp.
    • Whitten, A.1    Tygar, J.D.2
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
    • A. Adams and M.A. Sasse, "Users are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures," Comm. ACM, vol. 42, no. 12, 1999, pp. 41-46.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 4243138728 scopus 로고    scopus 로고
    • User interaction design for secure systems
    • Inst. for Infocomm Research/Chinese Academy of Sciences
    • K.-P. Yee, "User Interaction Design for Secure Systems," Proc. 4th Int'l Conf. Info. and Comm. Sec. (ICICS 02), Inst. for Infocomm Research/Chinese Academy of Sciences, 2002.
    • (2002) Proc. 4th Int'l Conf. Info. and Comm. Sec. (ICICS 02)
    • Yee, K.-P.1
  • 5
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J.H. Saltzer and M.D. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, vol. 63, 1975, pp. 1278-1308.
    • (1975) Proc. IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 6
    • 85084161317 scopus 로고    scopus 로고
    • Trusted paths for browsers
    • Usenix Assoc., Berkeley, Calif.
    • E. Ye and S.W. Smith, "Trusted Paths for Browsers," Proc. 11th Usenix Sec. Symp., Usenix Assoc., Berkeley, Calif., 2002, pp. 263-279.
    • (2002) Proc. 11th Usenix Sec. Symp. , pp. 263-279
    • Ye, E.1    Smith, S.W.2
  • 7
    • 85174249009 scopus 로고    scopus 로고
    • Digital signatures and electronic documents: A cautionary tale
    • Kluwer Academic Publishers
    • K. Kain, S.W Smith, and R. Asokan, "Digital Signatures and Electronic Documents: A Cautionary Tale," Advanced Comm. and Multimedia Security, Kluwer Academic Publishers, pp. 293-307; www.cs.dartmouth.edu/~sws/ papers/cmso2.pdf.
    • Advanced Comm. and Multimedia Security , pp. 293-307
    • Kain, K.1    Smith, S.W.2    Asokan, R.3
  • 8
    • 84883270143 scopus 로고    scopus 로고
    • Keyjacking: Risks of the current client-side infrastructure
    • Nat'l Inst. Standards and Technology
    • J. Marchesini, S.W. Smith, and M. Zhao, "Keyjacking: Risks of the Current Client-Side Infrastructure," Proc. 2nd PKI Research Workshop, Nat'l Inst. Standards and Technology, 2003; http://middleware.internet2.edu/pki03.
    • (2003) Proc. 2nd PKI Research Workshop
    • Marchesini, J.1    Smith, S.W.2    Zhao, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.