-
1
-
-
12844271558
-
Aligning security and usability
-
K.-P. Yee, "Aligning Security and Usability," IEEE Security & Privacy, vol. 2, no. 5, pp. 48-55, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.-P.1
-
3
-
-
12844272841
-
In search of usable security: Five lessons from the field
-
D. Balfanz, G. Durfee, D. Smetters, and R. Grinter, "In search of usable security: five lessons from the field," IEEE Security & Privacy, vol. 2, no. 5, pp. 19-24, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.3
Grinter, R.4
-
5
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of PGP 5.0
-
August Washington, 1999
-
A. Whitten and J. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in Proceedings of the 8th USENIX Security Symposium, August 1999, Washington, 1999, pp. 169-183.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-183
-
-
Whitten, A.1
Tygar, J.2
-
6
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM, vol. 42, no. 12, pp. 40-46, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
7
-
-
33745723917
-
-
Ph.D. dissertation, University of London [Online]. Available
-
A. Brostoff, "Improving password system effectiveness," Ph.D. dissertation, University of London, 2004. [Online]. Available: http://hornbeam.cs.ucl.ac.uk/hcs/publications/Brostoff- Improving%20Password%20System%20Effectiveness-Thesis%20final.pdf
-
(2004)
Improving Password System Effectiveness
-
-
Brostoff, A.1
-
8
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
[Online]. Available
-
S. Brostoff and M. A. Sasse, "Are Passfaces More Usable Than Passwords? A Field Trial Investigation," in Proceedings of HCI 2000, 2000. [Online]. Available: http://www.cs.ucl.ac.uk/staff/S.Brostoff/index\-files/ brostoff\-sasse\-hci2000.pdf
-
(2000)
Proceedings of HCI 2000
-
-
Brostoff, S.1
Sasse, M.A.2
-
9
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
New York, NY, USA: ACM
-
C. Kuo, S. Romanosky, and L. F. Cranor, "Human selection of mnemonic phrase-based passwords," in SOUPS '06: Proceedings of the second symposium on Usable privacy and security. New York, NY, USA: ACM, 2006, pp. 67-78.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
10
-
-
60649116908
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
New York, NY, USA: ACM
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice," in SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security. New York, NY, USA: ACM, 2005, pp. 1-12.
-
(2005)
SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Brodskiy, A.4
Memon, N.5
-
11
-
-
77953753799
-
Johnny 2: A user test of key continuity management with S/MIME and outlook express
-
New York, NY, USA: ACM
-
S. L. Garfinkel and R. C. Miller, "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express," in SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security. New York, NY, USA: ACM, 2005, pp. 13-24.
-
(2005)
SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 13-24
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
13
-
-
84949501863
-
Usability meets security - The identity-manager as your personal security assistant for the internet
-
D. Gerd tom Markotten, Ed.
-
U. Jendricke, U. Jendricke, and D. Gerd tom Markotten, "Usability meets security - the identity-manager as your personal security assistant for the internet," in Proc. 16th Annual Conference Computer Security Applications ACSAC '00, D. Gerd tom Markotten, Ed., 2000, pp. 344-353.
-
(2000)
Proc. 16th Annual Conference Computer Security Applications ACSAC '00
, pp. 344-353
-
-
Jendricke, U.1
Jendricke, U.2
Gerd Tom Markotten, D.3
-
15
-
-
70350738597
-
Serial hook-ups: A comparative usability study of secure device pairing methods
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang, "Serial Hook-ups: A Comparative Usability Study of Secure Device Pairing Methods," in SOUPS '09: Proceedings of the 5th symposium on Usable privacy and security, 2009.
-
(2009)
SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security
-
-
Kobsa, A.1
Sonawalla, R.2
Tsudik, G.3
Uzun, E.4
Wang, Y.5
-
16
-
-
38549108892
-
Usability analysis of secure pairing methods
-
[Online]. Available
-
E. Uzun, K. Karvonen, and N. Asokan, "Usability Analysis of Secure Pairing Methods," in Financial Cryptography and Data Security, 2007, pp. 307-324. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-77366-5-29
-
(2007)
Financial Cryptography and Data Security
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
17
-
-
19944372231
-
-
Ph.D. dissertation, Carnegie Mellon University
-
A. Whitten, "Making Security Usable," Ph.D. dissertation, Carnegie Mellon University, 2004.
-
(2004)
Making Security Usable
-
-
Whitten, A.1
-
19
-
-
33644942408
-
-
B. Shackel, "Usability - context, framework, definition, design and evaluation," pp. 21-37, 1991.
-
(1991)
Usability - Context, Framework, Definition, Design and Evaluation
, pp. 21-37
-
-
Shackel, B.1
-
21
-
-
34250012541
-
Red-eye blink, bendy shuffle, and the yuck factor: A user experience of biometric airport systems
-
M. A. Sasse, "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems," IEEE Security and Privacy, vol. 5, no. 3, pp. 78-81, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 78-81
-
-
Sasse, M.A.1
-
23
-
-
2342553334
-
"Ten strikes and you're out": Increasing the number of login attempts can improve password usability
-
John Wiley
-
S. Brostoff and M. A. Sasse, ""Ten strikes and you're out": Increasing the number of login attempts can improve password usability," in Proceedings of CHI 2003 Workshop on HCI and Security Systems. John Wiley, 2003.
-
(2003)
Proceedings of CHI 2003 Workshop on HCI and Security Systems
-
-
Brostoff, S.1
Sasse, M.A.2
-
24
-
-
0038713945
-
Usability and privacy: A study of kazaa P2P file-sharing
-
New York, NY, USA: ACM
-
N. S. Good and A. Krekelberg, "Usability and Privacy: A Study of Kazaa P2P File-sharing," in CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems. New York, NY, USA: ACM, 2003, pp. 137-144.
-
(2003)
CHI '03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 137-144
-
-
Good, N.S.1
Krekelberg, A.2
-
25
-
-
34548786769
-
The emperor's new security indicators
-
Washington, DC, USA: IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The Emperor's New Security Indicators," in SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2007, pp. 51-65.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
26
-
-
2342667933
-
Computer security: Anatomy of a usability disaster, and a plan for recovery
-
[Online]. Available
-
M. A. Sasse, "Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery," in Proceedings of CHI2003 Workshop on Human-Computer Interaction and Security Systems, 2003. [Online]. Available: http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-sasse.pdf
-
(2003)
Proceedings of CHI2003 Workshop on Human-Computer Interaction and Security Systems
-
-
Sasse, M.A.1
-
27
-
-
33745816410
-
Why phishing works
-
New York, NY, USA: ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst, "Why Phishing Works," in CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems. New York, NY, USA: ACM, 2006, pp. 581-590.
-
(2006)
CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
28
-
-
19944369828
-
Mechanisms for increasing the usability of grid security
-
hCI research in privacy and security. [Online]. Available
-
B. Beckles, V. Welch, and J. Basney, "Mechanisms for increasing the usability of grid security," International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 74-101, 2005, hCI research in privacy and security. [Online]. Available: http://www.sciencedirect.com/science/article/ B6WGR-4G94J0R-3/2/5091b0c39ca9b9e17034b62db0004969
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 74-101
-
-
Beckles, B.1
Welch, V.2
Basney, J.3
-
29
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
M. A. Sasse, S. Brostoff, and D. Weirich, "Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security," BT Technology Journal, vol. 19, no. 3, pp. 122-131, 2001.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
30
-
-
2342548557
-
-
New York, NY, USA: John Wiley & Sons, Inc.
-
K. D. Mitnick and W. L. Simon, The Art of Deception: Controlling the Human Element of Security. New York, NY, USA: John Wiley & Sons, Inc., 2003.
-
(2003)
The Art of Deception: Controlling the Human Element of Security
-
-
Mitnick, K.D.1
Simon, W.L.2
-
31
-
-
0344920920
-
Psychometric evaluation of an after-scenario questionnaire for computer usability studies: The ASQ
-
J. R. Lewis, "Psychometric evaluation of an after-scenario questionnaire for computer usability studies: the ASQ," SIGCHI Bull., vol. 23, no. 1, pp. 78-81, 1991.
-
(1991)
SIGCHI Bull.
, vol.23
, Issue.1
, pp. 78-81
-
-
Lewis, J.R.1
-
32
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
iT Decisions in Organizations. [Online]. Available
-
B.-Y. Ng, A. Kankanhalli, and Y. C. Xu, "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems, vol. 46, no. 4, pp. 815-825, 2009, iT Decisions in Organizations. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8S-4TYYMNV-3/2/ 842f546339406093d3e1fb6c28e5ef71
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
34
-
-
0030283177
-
Scenario-based analysis of software architecture
-
R. Kazman, G. Abowd, L. Bass, and P. Clements, "Scenario-Based Analysis of Software Architecture," IEEE Softw., vol. 13, no. 6, pp. 47-55, 1996.
-
(1996)
IEEE Softw.
, vol.13
, Issue.6
, pp. 47-55
-
-
Kazman, R.1
Abowd, G.2
Bass, L.3
Clements, P.4
-
35
-
-
1842829828
-
-
N. I. of standards, and T. (U.S.) U.S. Dept. of Commerce, National Institute of Standards and Technology, Gaithersburg, Md.
-
G. Stoneburner, A. Goguen, A. Feringa, N. I. of Standards, and T. (U.S.), Risk Management Guide for Information Technology Systems [Electronic Resource]: Recommendations of the National Institute of Standards and Technology / Gary Stoneburner, Alice Goguen, and Alexis Feringa. U.S. Dept. of Commerce, National Institute of Standards and Technology, Gaithersburg, Md.:, 2002.
-
(2002)
Risk Management Guide for Information Technology Systems [Electronic Resource]: Recommendations of the National Institute of Standards and Technology / Gary Stoneburner, Alice Goguen, and Alexis Feringa
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
|