메뉴 건너뛰기




Volumn 6949 LNCS, Issue PART 4, 2011, Pages 1-17

A field study of user behavior and perceptions in smartcard authentication

Author keywords

Human factors; multi factor authentication; security; smartcard

Indexed keywords

AUTHENTICATION SYSTEMS; ETHNOGRAPHIC METHODS; FIELD OBSERVATIONS; FIELD STUDIES; MULTI-FACTOR AUTHENTICATION; PERCEIVED BENEFITS; SECURITY; USER BEHAVIORS; WORK PROCESS; POSITIVE EXPERIENCES;

EID: 80052797960     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23768-3_1     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 1
    • 53049101320 scopus 로고    scopus 로고
    • National e-ID card schemes: A European overview
    • Arora, S.: National e-ID card schemes: A European overview. Information Security Technical Report 13(2), 46-53 (2008)
    • (2008) Information Security Technical Report , vol.13 , Issue.2 , pp. 46-53
    • Arora, S.1
  • 2
    • 67649868409 scopus 로고    scopus 로고
    • Smartcards and digital security
    • Aussel, J.: Smartcards and Digital Security. Computer Network Security 1, 42-56 (2007)
    • (2007) Computer Network Security , vol.1 , pp. 42-56
    • Aussel, J.1
  • 3
    • 70449904529 scopus 로고    scopus 로고
    • Utilizing smart cards for authentication and compliance tracking in a diabetes case management system
    • Baldwin, M. K., Malone, B. M.: Utilizing Smart Cards for Authentication and Compliance Tracking in a Diabetes Case Management System. In: Proceedings of ACM Conference on Software Engineering, pp. 521-522 (2008)
    • (2008) Proceedings of ACM Conference on Software Engineering , pp. 521-522
    • Baldwin, M.K.1    Malone, B.M.2
  • 5
    • 34250738462 scopus 로고    scopus 로고
    • Security and usability: The case of the user authentication methods
    • Braz, C., Robert, J. M.: Security and Usability: The Case of the User Authentication Methods. In: Proceedings of d'Interaction Homme-Machine, pp. 199-203 (2006)
    • (2006) Proceedings of D'Interaction Homme-machine , pp. 199-203
    • Braz, C.1    Robert, J.M.2
  • 7
    • 77950877250 scopus 로고    scopus 로고
    • So long and no thanks for the externalities: The rational rejection of security advice by users
    • Herley, C.: So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. In: Proceedings of New Security Perspectives Workshop 2009 (2009)
    • (2009) Proceedings of New Security Perspectives Workshop 2009
    • Herley, C.1
  • 11
    • 80052813583 scopus 로고    scopus 로고
    • Identity, credential, and access management at NASA, from zachman to attributes
    • Irwin, C. S., Taylor, D. C.: Identity, Credential, and Access Management at NASA, from Zachman to Attributes. In: Proceedings of IDtrust 2009, pp. 1-14 (2009)
    • (2009) Proceedings of IDtrust 2009 , pp. 1-14
    • Irwin, C.S.1    Taylor, D.C.2
  • 13
    • 34250771078 scopus 로고    scopus 로고
    • Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
    • Karger, P. A.: Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program. In: Proceedings of the Symposium on Usable Privacy and Security 2006, pp. 114-121 (2006)
    • (2006) Proceedings of the Symposium on Usable Privacy and Security 2006 , pp. 114-121
    • Karger, P.A.1
  • 15
    • 80052789974 scopus 로고    scopus 로고
    • National Institute of Standards and Technology: Personal identity verification (PIV) for federal employees and contractors
    • National Institute of Standards and Technology: Personal identity verification (PIV) for federal employees and contractors. FIPS PUB 201-1 (2006)
    • (2006) FIPS PUB , pp. 201-201
  • 16
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • O'Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proc. IEEE 91(12), 2019-2040 (2003)
    • (2003) Proc. IEEE , vol.91 , Issue.12 , pp. 2019-2040
    • O'Gorman, L.1
  • 18
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • Sasse, M. A., Brostoff, S., Weirich, D.: Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19(3), 122-131 (2001)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 19
    • 79955462845 scopus 로고    scopus 로고
    • Usability and trust in information systems
    • University College, London
    • Sasse, M. A.: Usability and Trust in Information Systems. In: Cyber Trust & Crime Prevention Project. University College, London (2004)
    • (2004) Cyber Trust & Crime Prevention Project
    • Sasse, M.A.1
  • 21
    • 84892469732 scopus 로고    scopus 로고
    • It's not what you know, but who you know: A social approach to last-resort authentication
    • Schechter, S., Egelman, S., Reeder, R. W.: It's not what you know, but who you know: a social approach to last-resort authentication. In: Proc. ACM CHI 2009, pp. 1983-1992 (2009)
    • (2009) Proc. ACM CHI 2009 , pp. 1983-1992
    • Schechter, S.1    Egelman, S.2    Reeder, R.W.3
  • 22
    • 80052802881 scopus 로고    scopus 로고
    • Productivity and usability effects of using a two-factor security system
    • Strouble, D. D., Schechtman, G. M., Alsop, A. S.: Productivity and Usability Effects of Using a Two-Factor Security System. In: Proceedings of SAIS, pp. 196-201 (2009)
    • (2009) Proceedings of SAIS , pp. 196-201
    • Strouble, D.D.1    Schechtman, G.M.2    Alsop, A.S.3
  • 23
  • 24
    • 80052793105 scopus 로고    scopus 로고
    • U. S. department of homeland security: Policy for a common identification standard for federal employees and contractors
    • August 27
    • U. S. Department of Homeland Security: Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12, August 27 (2004)
    • (2004) Homeland Security Presidential Directive HSPD-12
  • 25
    • 80052787509 scopus 로고    scopus 로고
    • U. S. Department of state: Cost/benefit comparison between pki/blade and passwordbased authentication v1.0
    • July 2010
    • U. S. Department of State: Cost/Benefit Comparison between PKI/BLADE and Passwordbased Authentication v1.0, July 2010 (2010), Point of contact, Steven Gregory, gregoryse@state.gov
    • (2010) Point of Contact, Steven Gregory
  • 26
    • 77549083913 scopus 로고    scopus 로고
    • Usable security: User preferences for authentication methods in eBanking and the effects of experience
    • Weir, C. S., Douglas, G., Richardson, T., Jack, M.: Usable security: User preferences for authentication methods in eBanking and the effects of experience. Interacting with Computers 22(3), 153-164 (2010)
    • (2010) Interacting with Computers , vol.22 , Issue.3 , pp. 153-164
    • Weir, C.S.1    Douglas, G.2    Richardson, T.3    Jack, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.