메뉴 건너뛰기




Volumn , Issue , 2005, Pages 112-117

Authentication interface evaluation and design for mobile devices

Author keywords

authentication interface design; handheld devices and mobile computing; security interface design; ubiquitous computing; user interface design

Indexed keywords

HAND HELD DEVICE; INTERFACE DESIGNS; USER INTERFACE DESIGN; USER INTERFACE DESIGNS;

EID: 34547330492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1107622.1107649     Document Type: Conference Paper
Times cited : (14)

References (22)
  • 1
    • 12844272841 scopus 로고    scopus 로고
    • Search of Usable Security: Five Lessons from the Field
    • September - October
    • Balfanz, D., Durfee, G., Grinter, R.E. & Smetters, D.K. (2004, September - October). In Search of Usable Security: Five Lessons from the Field. IEEE Security & Privacy, 2(5), 19-24.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 19-24
    • Balfanz, D.1    Durfee, G.2    Grinter, R.E.3    Smetters, D.K.4
  • 2
  • 3
    • 77953888897 scopus 로고    scopus 로고
    • July 27
    • Center for Discrete Mathematics & theoretical Computer Science. (2004, July 27). DIMACS Workshop on Usable Privacy and Security Software. http://dimacs.rutgers.edu/Workshops/Tools/slides/slides.html
    • (2004) DIMACS Workshop on Usable Privacy and Security Software.
  • 4
    • 77953899207 scopus 로고    scopus 로고
    • Class Slides, from Nova Southeastern University, Graduate School of Information Sciences
    • Cohen, M. (2004). DISS 720 Human Computer Interaction. Class Slides, from Nova Southeastern University, Graduate School of Information Sciences.
    • (2004) DISS 720 Human Computer Interaction
    • Cohen, M.1
  • 5
    • 12844259531 scopus 로고    scopus 로고
    • Secure or Usable
    • September - October
    • Craner, L.F. & Garfinkel, S.. (2004, September - October). Secure or Usable. IEEE Security & Privacy, 2(5), 16-18.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 16-18
    • Craner, L.F.1    Garfinkel, S.2
  • 9
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications
    • New York: ACM Press
    • Grinter, R. E. & Smetters, D. K. (2002). Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications. Proceedings of the 2002 workshop on New security paradigms (pp. 82-89). New York: ACM Press.
    • (2002) Proceedings of the 2002 Workshop on New Security Paradigms , pp. 82-89
    • Grinter, R.E.1    Smetters, D.K.2
  • 10
    • 4644291382 scopus 로고    scopus 로고
    • Internet Accessibility: Beyond Disability
    • September
    • Hofstader, C. (2004, September). Internet Accessibility: Beyond Disability. Computer, 37(9), 103-105.
    • (2004) Computer , vol.37 , Issue.9 , pp. 103-105
    • Hofstader, C.1
  • 11
    • 77953903528 scopus 로고    scopus 로고
    • February
    • IndiaExpress Bureau. (February 2003). 2003 Will Be A Year of Mobile Developers. http://www.indiaexpress.com/news/technology/20030201-1.html
    • (2003) 2003 Will Be a Year of Mobile Developers
  • 14
    • 28844505804 scopus 로고    scopus 로고
    • Microsoft Corporation. Fifth Edition. Microsoft Press. Redmond, Washington
    • Microsoft Corporation. (2002). Microsoft Computer Dictionary, Fifth Edition. Microsoft Press. Redmond, Washington.
    • (2002) Microsoft Computer Dictionary
  • 15
    • 77953899945 scopus 로고    scopus 로고
    • Motorola Incorporated. (2004). Motorola MPx200 Phone for AT&T Wireless. http://commerce.motorola.com/cgi-bin/ncommerce3/ProductDisplay? prrfnbr=253227&prmenbr=126&phone-cgrfnbr=1&zipcode=
    • (2004) Motorola MPx200 Phone for AT&T Wireless
  • 18
    • 3042740017 scopus 로고    scopus 로고
    • Humans in the Loop: Human-Computer Interaction and Security
    • Smith, S.W. (2003). Humans in the Loop: Human-Computer Interaction and Security, IEEE Security & Privacy, 1(3), 75-79.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 75-79
    • Smith, S.W.1
  • 19
    • 0036251274 scopus 로고    scopus 로고
    • Generational Differences: Revisiting Generational Work Values for the New Millennium
    • Smola, K.W. & Sutton, C.D. (2002). Generational Differences: Revisiting Generational Work Values for the New Millennium, Journal of Organizational Behavior, 23(4), 363-382.
    • (2002) Journal of Organizational Behavior , vol.23 , Issue.4 , pp. 363-382
    • Smola, K.W.1    Sutton, C.D.2
  • 22
    • 12844271558 scopus 로고    scopus 로고
    • Aligning Security and Usability
    • September - October
    • Yee, K.P. (2004, September - October). Aligning Security and Usability. IEEE Security & Privacy, 2(5), 48-55.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.