-
1
-
-
53049101320
-
National e-ID card schemes: A European overview
-
Arora, S.: National e-ID card schemes: A European overview. Information Security Technical Report 13(2), 46-53 (2008)
-
(2008)
Information Security Technical Report
, vol.13
, Issue.2
, pp. 46-53
-
-
Arora, S.1
-
2
-
-
67649868409
-
Smartcards and digital security
-
Aussel, J.: Smartcards and Digital Security. Computer Network Security 1, 42-56 (2007)
-
(2007)
Computer Network Security
, vol.1
, pp. 42-56
-
-
Aussel, J.1
-
3
-
-
70449904529
-
Utilizing smart cards for authentication and compliance tracking in a diabetes case management system
-
Baldwin, M. K., Malone, B. M.: Utilizing Smart Cards for Authentication and Compliance Tracking in a Diabetes Case Management System. In: Proceedings of ACM Conference on Software Engineering, pp. 521-522 (2008)
-
(2008)
Proceedings of ACM Conference on Software Engineering
, pp. 521-522
-
-
Baldwin, M.K.1
Malone, B.M.2
-
4
-
-
34547363189
-
Fourth-factor authentication: Somebody you know
-
Brainard, J., Juels, A., Rivest, R. L., Szydlo, M., Yung, M.: Fourth-Factor Authentication: Somebody You Know. In: Proceedings of ACM CCS, pp. 168-178 y (2006)
-
(2006)
Proceedings of ACM CCS
, pp. 168-178
-
-
Brainard, J.1
Juels, A.2
Rivest, R.L.3
Szydlo, M.4
Yung, M.5
-
5
-
-
34250738462
-
Security and usability: The case of the user authentication methods
-
Braz, C., Robert, J. M.: Security and Usability: The Case of the User Authentication Methods. In: Proceedings of d'Interaction Homme-Machine, pp. 199-203 (2006)
-
(2006)
Proceedings of D'Interaction Homme-machine
, pp. 199-203
-
-
Braz, C.1
Robert, J.M.2
-
7
-
-
77950877250
-
So long and no thanks for the externalities: The rational rejection of security advice by users
-
Herley, C.: So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. In: Proceedings of New Security Perspectives Workshop 2009 (2009)
-
(2009)
Proceedings of New Security Perspectives Workshop 2009
-
-
Herley, C.1
-
11
-
-
80052813583
-
Identity, credential, and access management at NASA, from zachman to attributes
-
Irwin, C. S., Taylor, D. C.: Identity, Credential, and Access Management at NASA, from Zachman to Attributes. In: Proceedings of IDtrust 2009, pp. 1-14 (2009)
-
(2009)
Proceedings of IDtrust 2009
, pp. 1-14
-
-
Irwin, C.S.1
Taylor, D.C.2
-
12
-
-
84874561028
-
Implicit authentication for mobile devices
-
Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit Authentication for Mobile Devices. In: Proceedings of USENIX Workshop on HotSec (2009)
-
(2009)
Proceedings of USENIX Workshop on HotSec
-
-
Jakobsson, M.1
Shi, E.2
Golle, P.3
Chow, R.4
-
13
-
-
34250771078
-
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
-
Karger, P. A.: Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program. In: Proceedings of the Symposium on Usable Privacy and Security 2006, pp. 114-121 (2006)
-
(2006)
Proceedings of the Symposium on Usable Privacy and Security 2006
, pp. 114-121
-
-
Karger, P.A.1
-
14
-
-
77955217681
-
Chip and PIN is broken
-
Murdoch, S. J., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is Broken. In: Proceedings of IEEE Symposium on Security & Privacy 2010, pp. 433-446 (2010)
-
(2010)
Proceedings of IEEE Symposium on Security & Privacy 2010
, pp. 433-446
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
15
-
-
80052789974
-
National Institute of Standards and Technology: Personal identity verification (PIV) for federal employees and contractors
-
National Institute of Standards and Technology: Personal identity verification (PIV) for federal employees and contractors. FIPS PUB 201-1 (2006)
-
(2006)
FIPS PUB
, pp. 201-201
-
-
-
16
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
O'Gorman, L.: Comparing Passwords, Tokens, and Biometrics for User Authentication. Proc. IEEE 91(12), 2019-2040 (2003)
-
(2003)
Proc. IEEE
, vol.91
, Issue.12
, pp. 2019-2040
-
-
O'Gorman, L.1
-
17
-
-
0006456817
-
A task analysis of usability in third-party authentication
-
Proctor, R. W., Lien, M. C., Salvendy, G., Schultz, E. E.: A Task Analysis of Usability in Third-Party Authentication. Information Security Bulletin 5(3), 49-56 (2000)
-
(2000)
Information Security Bulletin
, vol.5
, Issue.3
, pp. 49-56
-
-
Proctor, R.W.1
Lien, M.C.2
Salvendy, G.3
Schultz, E.E.4
-
18
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S., Weirich, D.: Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19(3), 122-131 (2001)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
19
-
-
79955462845
-
Usability and trust in information systems
-
University College, London
-
Sasse, M. A.: Usability and Trust in Information Systems. In: Cyber Trust & Crime Prevention Project. University College, London (2004)
-
(2004)
Cyber Trust & Crime Prevention Project
-
-
Sasse, M.A.1
-
20
-
-
34548786769
-
The emperor's new security indicators
-
Schechter, S. E., Dhamija, R., Ozment, A., Fischer, I.: The Emperor's New Security Indicators. In: Proceedings of IEEE Symposium on Security & Privacy 2007, pp. 51-65 (2007)
-
(2007)
Proceedings of IEEE Symposium on Security & Privacy 2007
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
21
-
-
84892469732
-
It's not what you know, but who you know: A social approach to last-resort authentication
-
Schechter, S., Egelman, S., Reeder, R. W.: It's not what you know, but who you know: a social approach to last-resort authentication. In: Proc. ACM CHI 2009, pp. 1983-1992 (2009)
-
(2009)
Proc. ACM CHI 2009
, pp. 1983-1992
-
-
Schechter, S.1
Egelman, S.2
Reeder, R.W.3
-
22
-
-
80052802881
-
Productivity and usability effects of using a two-factor security system
-
Strouble, D. D., Schechtman, G. M., Alsop, A. S.: Productivity and Usability Effects of Using a Two-Factor Security System. In: Proceedings of SAIS, pp. 196-201 (2009)
-
(2009)
Proceedings of SAIS
, pp. 196-201
-
-
Strouble, D.D.1
Schechtman, G.M.2
Alsop, A.S.3
-
23
-
-
33751181707
-
Password policy: The good, the bad, and the ugly
-
Summers, W. C., Bosworth, E.: Password policy: the good, the bad, and the ugly. In: Proceedings of WISICT 2004, pp. 1-6 (2004)
-
(2004)
Proceedings of WISICT 2004
, pp. 1-6
-
-
Summers, W.C.1
Bosworth, E.2
-
24
-
-
80052793105
-
U. S. department of homeland security: Policy for a common identification standard for federal employees and contractors
-
August 27
-
U. S. Department of Homeland Security: Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12, August 27 (2004)
-
(2004)
Homeland Security Presidential Directive HSPD-12
-
-
-
25
-
-
80052787509
-
U. S. Department of state: Cost/benefit comparison between pki/blade and passwordbased authentication v1.0
-
July 2010
-
U. S. Department of State: Cost/Benefit Comparison between PKI/BLADE and Passwordbased Authentication v1.0, July 2010 (2010), Point of contact, Steven Gregory, gregoryse@state.gov
-
(2010)
Point of Contact, Steven Gregory
-
-
-
26
-
-
77549083913
-
Usable security: User preferences for authentication methods in eBanking and the effects of experience
-
Weir, C. S., Douglas, G., Richardson, T., Jack, M.: Usable security: User preferences for authentication methods in eBanking and the effects of experience. Interacting with Computers 22(3), 153-164 (2010)
-
(2010)
Interacting with Computers
, vol.22
, Issue.3
, pp. 153-164
-
-
Weir, C.S.1
Douglas, G.2
Richardson, T.3
Jack, M.4
|