메뉴 건너뛰기




Volumn 13, Issue 3, 2006, Pages 45-47

What do they "Indicate?" evaluating security and privacy indicators

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; DECISION MAKING; GRAPHIC METHODS; GRAPHICAL USER INTERFACES; WEB BROWSERS;

EID: 33646680778     PISSN: 10725520     EISSN: None     Source Type: Trade Journal    
DOI: 10.1145/1125864.1125890     Document Type: Review
Times cited : (31)

References (7)
  • 4
    • 33750310718 scopus 로고    scopus 로고
    • Informed consent by design
    • Cranor, L. and Garfinkel, S. eds. O'Reilly Media, Inc.
    • Friedman, B., Lin, P., and Miller, J.K. Informed consent by design. In Cranor, L. and Garfinkel, S. eds. 2005 Security and Usability. O'Reilly Media, Inc., 477-504.
    • 2005 Security and Usability , pp. 477-504
    • Friedman, B.1    Lin, P.2    Miller, J.K.3
  • 5
    • 84940450758 scopus 로고    scopus 로고
    • Inside risks: Semantic network attacks
    • (Dec. 2000), 168. DOI= http://doi.acm.org/10.1145/355112.355131
    • Schneier, B. 2000. Inside risks: semantic network attacks. Commun. ACM 43, 12 (Dec. 2000), 168. DOI= http://doi.acm.org/10.1145/355112.355131
    • (2000) Commun. ACM , vol.43 , pp. 12
    • Schneier, B.1
  • 7
    • 23244459906 scopus 로고    scopus 로고
    • Trusted paths for browsers
    • Secur 8, 2 (May 2005), 153-186. DOI= http://doi.acm.org/10.1145/1065545. 1065546
    • Ye, Z., Smith, S., and Anthony, D. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Secur 8, 2 (May 2005), 153-186. DOI= http://doi.acm.org/10. 1145/1065545.1065546
    • (2005) ACM Trans. Inf. Syst.
    • Ye, Z.1    Smith, S.2    Anthony, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.