메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-16

A usability study and critique of two password managers

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; MANAGERS;

EID: 80052801173     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (170)

References (34)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M.A. Sasse. Users are not the enemy. Comm. of the ACM, 42(12):41–46, 1999.
    • (1999) Comm. of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 9
    • 0346271799 scopus 로고    scopus 로고
    • Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
    • L. Faulkner. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers, 35(3):379–383, 2003.
    • (2003) Behavior Research Methods, Instruments, & Computers , vol.35 , Issue.3 , pp. 379-383
    • Faulkner, L.1
  • 13
    • 34547163161 scopus 로고    scopus 로고
    • Technical report, Hewlett-Packard Laboratories, January
    • A. Karp. Site-specific passwords. Technical report, Hewlett-Packard Laboratories, January 2002.
    • (2002) Site-Specific Passwords
    • Karp, A.1
  • 15
    • 85077699008 scopus 로고    scopus 로고
    • accessed January 2006
    • Password Maker web site, http://passwordmaker.org/, accessed January 2006.
    • Password Maker Web Site
  • 16
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • June
    • R. Likert. A technique for the measurement of attitudes. Archives of Psychology, 140, June 1932.
    • (1932) Archives of Psychology , vol.140
    • Likert, R.1
  • 20
    • 0002292167 scopus 로고
    • Cognitive engineering
    • D.A. Norman and S.W. Draper, editors, chapter 3, Lawrence Erlbaum Associates, Publishers: Hillsdale, NJ
    • D.A. Norman. Cognitive engineering. In D.A. Norman and S.W. Draper, editors, User Centered System Design: New Perspectives on Human-Computer Interaction, chapter 3, pages 31–62. Lawrence Erlbaum Associates, Publishers: Hillsdale, NJ, 1986.
    • (1986) User Centered System Design: New Perspectives on Human-Computer Interaction , pp. 31-62
    • Norman, D.A.1
  • 23
    • 35348885452 scopus 로고    scopus 로고
    • Evaluating authentication mechanisms
    • L.F Cranor and S. Garfinkel, editors, chapter 6, O’Reilly Media
    • K. Renaud. Evaluating Authentication Mechanisms. In L.F Cranor and S. Garfinkel, editors, Security and Usability, chapter 6, pages 103–128. O’Reilly Media, 2005.
    • (2005) Security and Usability , pp. 103-128
    • Renaud, K.1
  • 25
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J.H. Saltzer and M.D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278–1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 26
    • 35348863698 scopus 로고    scopus 로고
    • Usable security: Why do we need it? How do we get it?
    • L.F. Cranor and S. Garfinkel, editors, chapter 2, O’Reilly Media
    • M.A Sasse and I. Flechais. Usable Security: Why do we need it? How do we get it? In L.F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 2, pages 13–30. O’Reilly Media, 2005.
    • (2005) Security and Usability , pp. 13-30
    • Sasse, M.A.1    Flechais, I.2
  • 29
    • 0026757295 scopus 로고
    • Refining the test phase of usability evaluation: How many subjects is enough?
    • R.A. Virzi. Refining the test phase of usability evaluation: How many subjects is enough? Human Factors, 34:457–468, 1992.
    • (1992) Human Factors , vol.34 , pp. 457-468
    • Virzi, R.A.1
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.