메뉴 건너뛰기




Volumn 12, Issue 3, 2008, Pages 13-20

A brief introduction to usable Security

Author keywords

Computer security; Cryptography; Electronic mail; Email encryption; Face; Guidelines; Security; Usability; Useable computer security; User authentication; User interface

Indexed keywords

USER AUTHENTICATION;

EID: 44449091000     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2008.50     Document Type: Article
Times cited : (61)

References (25)
  • 1
    • 0018543411 scopus 로고
    • Password Security: A Case History
    • R. Morris and K. Thompson, "Password Security: A Case History," Comm. ACM, vol. 22, no. 11, 1979, pp. 594-597.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 2
    • 60649116908 scopus 로고    scopus 로고
    • Authentication using Graphical Passwords: Effects of Tolerance and image Choice
    • ACM Press
    • S. Wiedenback et al., "Authentication using Graphical Passwords: Effects of Tolerance and image Choice," Proc. Symp. Usable Privacy and Security, ACM Press, 2005, pp. 1-12.
    • (2005) Proc. Symp. Usable Privacy and Security , pp. 1-12
    • Wiedenback, S.1
  • 3
    • 0019895650 scopus 로고
    • A Password Extension for improved Human Factors
    • S.N.A. Porter, "A Password Extension for improved Human Factors," Computers & Security, vol. 1, no. 1, 1982, pp. 54-56.
    • (1982) Computers & Security , vol.1 , Issue.1 , pp. 54-56
    • Porter, S.N.A.1
  • 4
    • 0021481768 scopus 로고
    • Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms
    • J.A. Haskett, "Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms," Comm. ACM, vol. 27, no. 8, 1984, pp. 777-781.
    • (1984) Comm. ACM , vol.27 , Issue.8 , pp. 777-781
    • Haskett, J.A.1
  • 5
    • 0021470294 scopus 로고
    • User-Friendly Password Methods for Computer-Mediated Information Systems
    • B.F. Barton and M.S. Barton, "User-Friendly Password Methods for Computer-Mediated Information Systems," Computers a Security, vol. 3, no. 3, 1984, pp. 186-195.
    • (1984) Computers a Security , vol.3 , Issue.3 , pp. 186-195
    • Barton, B.F.1    Barton, M.S.2
  • 6
    • 0025545602 scopus 로고
    • Cognitive Passwords: The Key to Easy Access Control
    • M. Zviran and W.J. Haga, "Cognitive Passwords: The Key to Easy Access Control," Computers & Security, vol. 9, no. 8, 1990, pp. 723-736.
    • (1990) Computers & Security , vol.9 , Issue.8 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2
  • 7
    • 0003429117 scopus 로고    scopus 로고
    • Are Passfaces More Usable than Passwords? A Field Trial investigation
    • ACM Press
    • S. Brostoff and A.M. Sasse, "Are Passfaces More Usable than Passwords? A Field Trial investigation," Proc. Human-Computer Interactions (CHI 00), ACM Press, 2000, pp. 405-424.
    • (2000) Proc. Human-Computer Interactions (CHI 00) , pp. 405-424
    • Brostoff, S.1    Sasse, A.M.2
  • 8
    • 0005765077 scopus 로고    scopus 로고
    • The Design and Analysis of Graphical Passwords
    • Usenix Assoc
    • I. Jermyn et al., "The Design and Analysis of Graphical Passwords," Proc. 9th, Usenix Security Symp., Usenix Assoc., 2000, pp. 1-14.
    • (2000) Proc. 9th, Usenix Security Symp , pp. 1-14
    • Jermyn, I.1
  • 9
    • 85084161493 scopus 로고    scopus 로고
    • Deja Vu: A User Study Using Images for Authentication
    • Usenix Assoc
    • R. Dhamija and A. Perrig, "Deja Vu: A User Study Using Images for Authentication," Proc. 9th Usenix Security Symp.," Usenix Assoc., 2000, pp. 45-58.
    • (2000) Proc. 9th Usenix Security Symp , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 11
    • 85084163855 scopus 로고    scopus 로고
    • Graphical Dictionaries and the Memorable Space of Graphical Passwords
    • Usenix Assoc
    • J. Thorpe and P.C.V. Oorschot, "Graphical Dictionaries and the Memorable Space of Graphical Passwords," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, pp. 135-150.
    • (2004) Proc. 13th Usenix Security Symp , pp. 135-150
    • Thorpe, J.1    Oorschot, P.C.V.2
  • 12
    • 0040268965 scopus 로고
    • Internet Privacy Enhanced Mail
    • S.T. Kent, "Internet Privacy Enhanced Mail," Comm. ACM, vol. 36, no. 8, 1993, pp. 48-60.
    • (1993) Comm. ACM , vol.36 , Issue.8 , pp. 48-60
    • Kent, S.T.1
  • 14
    • 44449165905 scopus 로고    scopus 로고
    • S. Garfinkel, Signed, Sealed and Delivered, CSO Online, April 2004, www.csoonline.com/read/040104/shop.html.
    • S. Garfinkel, "Signed, Sealed and Delivered," CSO Online, April 2004, www.csoonline.com/read/040104/shop.html.
  • 17
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
    • Usenix Assoc
    • A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th, Usenix Security Sym., Usenix Assoc., 1999, pp. 169-184.
    • (1999) Proc. 8th, Usenix Security Sym , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 18
    • 77953753799 scopus 로고    scopus 로고
    • Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express
    • ACM Press
    • S.L. Garfinkel and R.C. Miller, "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express," Proc. Symp. Usable Privacy and Security, ACM Press, 2005, pp. 13-24.
    • (2005) Proc. Symp. Usable Privacy and Security , pp. 13-24
    • Garfinkel, S.L.1    Miller, R.C.2
  • 24
    • 85084163516 scopus 로고    scopus 로고
    • Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute
    • Usenix Assoc
    • D. Balfanz et al., "Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute," Usenix Security Symp., Usenix Assoc., 2004, pp. 207-222.
    • (2004) Usenix Security Symp , pp. 207-222
    • Balfanz, D.1
  • 25
    • 0038713945 scopus 로고    scopus 로고
    • Usability and Privacy: A Study of Kazaa P2P File-Sharing
    • ACM Press
    • N.S. Good and A. Krekelberg, "Usability and Privacy: A Study of Kazaa P2P File-Sharing," Proc. Human-Computer Interactions (CHI 03), vol. 5, ACM Press, 2003, pp. 137-144.
    • (2003) Proc. Human-Computer Interactions (CHI 03) , vol.5 , pp. 137-144
    • Good, N.S.1    Krekelberg, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.