-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A., Sasse, M.A. (1999) Users are not the enemy. Communications of the ACM, 42(12), 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
70349581413
-
Usable Biometrics
-
L. Cranor and S. Garfinkel Eds, O'Reilly, pp
-
Coventry, L. (2005). Usable Biometrics. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly, pp. 175-198.
-
(2005)
Designing Secure Systems that People Can Use
, pp. 175-198
-
-
Coventry, L.1
-
4
-
-
0242313583
-
Automatic extraction and description of human gait models for recognition purposes
-
April
-
Cunado, D., Nixon, M.S. and Carter J.N. (2003). Automatic extraction and description of human gait models for recognition purposes. Computer Vision and Image Understanding, 90(1), April 2003, Pages 1-41.
-
(2003)
Computer Vision and Image Understanding
, vol.90
, Issue.1
, pp. 1-41
-
-
Cunado, D.1
Nixon, M.S.2
Carter, J.N.3
-
5
-
-
57049083759
-
Banking on security and control? UK companies face overhaul of controls
-
Hinde, S. (2004). Banking on security and control? UK companies face overhaul of controls. Computer Fraud and Security, 8, 2-4.
-
(2004)
Computer Fraud and Security
, vol.8
, pp. 2-4
-
-
Hinde, S.1
-
6
-
-
0002871462
-
Integrated technologies for indexing spoken language
-
Feb, p
-
Kubala F., Colbath, S., Liu, D., Srivastava, A., Makhoul, J. (2000). Integrated technologies for indexing spoken language, Communications of the ACM, 43:2 (Feb), p.48-56.
-
(2000)
Communications of the ACM
, vol.43
, Issue.2
, pp. 48-56
-
-
Kubala, F.1
Colbath, S.2
Liu, D.3
Srivastava, A.4
Makhoul, J.5
-
7
-
-
34547129522
-
Trust and privacy permissions for an ambient world
-
R. Song, L. Korba, G. Yee Eds, USA: Ideas Group, Chapter 11
-
Little, L., Marsh, S., & Briggs, P. (2006). Trust and privacy permissions for an ambient world. In R. Song, L. Korba, G. Yee (Eds.) Trust in e-services: technologies, practices and challenges. USA: Ideas Group, Chapter 11
-
(2006)
Trust in e-services: Technologies, practices and challenges
-
-
Little, L.1
Marsh, S.2
Briggs, P.3
-
8
-
-
34548090575
-
-
Livia C. F. Araujo, Luiz H. R. Sucupira Jr., Miguel G. Lizarraga, Lee L Ling, Joao B. T. Yabu-uti (2004). User Authentication through Typing Biometrics Features. Proceedings of the First International Conference on Biometrie Authentication, ICBA 2004, Springer-Verlag Heidelberg, International Conference on Biometrie Authentication, 694-700.
-
Livia C. F. Araujo, Luiz H. R. Sucupira Jr., Miguel G. Lizarraga, Lee L Ling, Joao B. T. Yabu-uti (2004). User Authentication through Typing Biometrics Features. Proceedings of the First International Conference on Biometrie Authentication, ICBA 2004, Springer-Verlag Heidelberg, International Conference on Biometrie Authentication, 694-700.
-
-
-
-
9
-
-
33646811518
-
Identifying users of portable devices from gait pattern with accelerometers. Proceedings. (ICASSP '05)
-
Mantyjarvi, J. Lindholm, M. Vildjiounaite, E. Makela, S.-M. Ailisto, H.A. (2005). Identifying users of portable devices from gait pattern with accelerometers. Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume: 2, pp. 973-976.
-
(2005)
IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 973-976
-
-
Mantyjarvi, J.1
Lindholm, M.2
Vildjiounaite, E.3
Makela, S.-M.4
Ailisto, H.A.5
-
14
-
-
35348885452
-
Evaluating Authentication Mechanisms, in Security and Usability
-
L. Cranor and S. Garfinkel Eds, O'Reilly, pp
-
Renaud, K. V. (2005). Evaluating Authentication Mechanisms, in Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly, pp. 103-128.
-
(2005)
Designing Secure Systems that People Can Use
, pp. 103-128
-
-
Renaud, K.V.1
-
16
-
-
34547294916
-
The memorability and security of passwords, in Security and Usability
-
L. Cranor and S. Garfinkel Eds, O'Reilly, pp
-
Yan, J., Blackwell, A., Anderson, R. and Grant, A. (2005). The memorability and security of passwords, in Security and Usability. In L. Cranor and S. Garfinkel (Eds.) Designing Secure Systems that People Can Use. O'Reilly, pp. 129-142.
-
(2005)
Designing Secure Systems that People Can Use
, pp. 129-142
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
17
-
-
57049144536
-
-
ACM Press 2001
-
. Proc. Hypertext 2001, ACM Press (2001), 9-18.
-
Proc. Hypertext 2001
, pp. 9-18
-
-
|