-
3
-
-
0242708756
-
-
Brostoff, S., and Sasse, M.A. (2001). Safe and sound: a safety-critical approach to security. NSPW, New Mexico, USA, pp. 41-50.
-
Brostoff, S., and Sasse, M.A. (2001). Safe and sound: a safety-critical approach to security. NSPW, New Mexico, USA, pp. 41-50.
-
-
-
-
4
-
-
60349118061
-
A Second Look at the Usability of Click-Based Graphical Passwords
-
Pittsburgh, USA
-
Chiasson, S., Biddle, R., van Oorschot, PC. (2007). A Second Look at the Usability of Click-Based Graphical Passwords. Symposium on usable privacy and security, Pittsburgh, USA.
-
(2007)
Symposium on usable privacy and security
-
-
Chiasson, S.1
Biddle, R.2
van Oorschot, P.C.3
-
7
-
-
33745816410
-
-
CHI
-
Dhamija, R., Tygar, J. D., and Hearst, M. (2006). Why phishing works. Proc. CHI 2006, 581-590.
-
(2006)
Why phishing works. Proc
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
8
-
-
33745594668
-
Divide and Conquer: The role of trust and assurance in the design of secure socio-technical systems
-
California, USA
-
Flechais, I., Riegelsberger, J., Sasse, M.A. (2005). Divide and Conquer: the role of trust and assurance in the design of secure socio-technical systems. Proc. New security paradigms workshop 2005, Lake Arrowhead, California, USA.
-
(2005)
Proc. New security paradigms workshop 2005, Lake Arrowhead
-
-
Flechais, I.1
Riegelsberger, J.2
Sasse, M.A.3
-
9
-
-
57049097166
-
-
2002, Network Security: Private Communication in a Public World, 2nd ed, Prentice-Hall
-
Kaufman, C., Perlman, R., and Speciner M. (2002). Network Security: Private Communication in a Public World, 2nd ed., Prentice-Hall.
-
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
10
-
-
35248872559
-
Validating and Securing Spontaneous Associations between Wireless Devices
-
Proc. 6th Information Security Conference ISC'03, Springer
-
Kindberg, T. & Zhang, K. (2002). Validating and Securing Spontaneous Associations between Wireless Devices. Proc. 6th Information Security Conference (ISC'03), LNCS 2581, Springer, 44-53.
-
(2002)
LNCS
, vol.2581
, pp. 44-53
-
-
Kindberg, T.1
Zhang, K.2
-
11
-
-
33745875633
-
Building Common Ground for Face to Face Interactions by Sharing Mobile Device Context. Proc. LOCA
-
Dublin, Ireland, Springer
-
Kostakos, V., O'Neill, E., Shahi, A. (2006). Building Common Ground for Face to Face Interactions by Sharing Mobile Device Context. Proc. LOCA 2006, Dublin, Ireland. LNCS 3987, Springer, 222-238.
-
(2006)
LNCS
, vol.3987
, pp. 222-238
-
-
Kostakos, V.1
O'Neill, E.2
Shahi, A.3
-
12
-
-
34547684418
-
NFC on mobile phones: Issues, lessons and future research. Proc. Percom 2007
-
NY, USA
-
Kostakos, V. and O'Neill, E. (2007). NFC on mobile phones: issues, lessons and future research. Proc. Percom 2007, Pervasive RFID/NFC Technology Workshop (Pertec 2007), NY, USA, 367-370.
-
(2007)
Pervasive RFID/NFC Technology Workshop (Pertec
, pp. 367-370
-
-
Kostakos, V.1
O'Neill, E.2
-
13
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
Proc. Pervasive, Springer
-
Mayrhofer R. & Gellersen, H. (2007). Shake well before use: Authentication based on accelerometer data. In Proc. Pervasive 2007, LNCS 4480, Springer, 44-161,
-
(2007)
LNCS
, vol.4480
, pp. 44-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
15
-
-
38049079703
-
Reach out and touch: Using NFC and 2D barcodes for service discovery and interaction with mobile devices
-
Proc. Pervasive, Springer
-
O'Neill, E., Thompson, P., Garzonis, S. and Warr, A. (2007). Reach out and touch: using NFC and 2D barcodes for service discovery and interaction with mobile devices. In Proc. Pervasive 2007, LNCS 4480, Springer, 19-36.
-
(2007)
LNCS
, vol.4480
, pp. 19-36
-
-
O'Neill, E.1
Thompson, P.2
Garzonis, S.3
Warr, A.4
-
17
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Saltzer, J.H. & Schroeder, M.D. (1975). The Protection of Information in Computer Systems. Proc. IEEE, 63(9):1278-1308.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
18
-
-
3042740017
-
Humans in the Loop
-
Smith, S.W. (2003). Humans in the Loop. IEEE Security & Privacy, 1(3):75-79.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 75-79
-
-
Smith, S.W.1
-
19
-
-
33745912365
-
Security for Whom? The shifting security assumptions of pervasive computing
-
Proc. Software Security, Theories and Systems, Springer
-
Stajano, F. (2003). Security for Whom? The shifting security assumptions of pervasive computing. Proc. Software Security - Theories and Systems, LNCS 2609, Springer, 16-27.
-
(2003)
LNCS
, vol.2609
, pp. 16-27
-
-
Stajano, F.1
|