-
2
-
-
63049091681
-
From desktop to mobile: Examining the security experience
-
Botha, R., Furnell, S., and Clarke, N.: From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4):130-137, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.3-4
, pp. 130-137
-
-
Botha, R.1
Furnell, S.2
Clarke, N.3
-
4
-
-
26844493026
-
Authentication of users on mobile telephones - A survey of attitudes and practices
-
DOI 10.1016/j.cose.2005.08.003, PII S0167404805001446
-
Clarke, N., and Furnell, S.: Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security, 24(7):519-527, 2005. (Pubitemid 41455412)
-
(2005)
Computers and Security
, vol.24
, Issue.7
, pp. 519-527
-
-
Clarke, N.L.1
Furnell, S.M.2
-
5
-
-
33847652928
-
Advanced user authentication for mobile devices
-
DOI 10.1016/j.cose.2006.08.008, PII S0167404806001428
-
Clarke, N., and Furnell, S.: Advanced user authentication for mobile devices. Computers &Security, 26(2):109-119, 2007. (Pubitemid 46367239)
-
(2007)
Computers and Security
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.M.2
-
6
-
-
0036276843
-
Acceptance of subscriber authentication methods for mobile telephony devices
-
DOI 10.1016/S0167-4048(02)00304-8
-
Clarke, N., Furnell, S., Rodwell, P., and Reynolds P.: Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21(3):220-228, 2002. (Pubitemid 34593576)
-
(2002)
Computers and Security
, vol.21
, Issue.3
, pp. 220-228
-
-
Clarke, N.L.1
Furnell, S.M.2
Rodwell, P.M.3
Reynolds, P.L.4
-
7
-
-
80054836520
-
Biometric authentication for mobile devices
-
Clarke, N.,Furnell, S., Reynolds P.: Biometric authentication for mobile devices. In: Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002
-
Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002
-
-
Clarke, N.1
Furnell, S.2
Reynolds, P.3
-
8
-
-
78651441877
-
"My Smartphone is a Safe!" the user's point of view regarding novel authentication methods and gradual security levels on smartphones
-
Dörflinger, T., Voth, A., Krämer, J.: "My Smartphone is a Safe!" The user's point of view regarding novel authentication methods and gradual security levels on smartphones. The International Conference on Security and Cryptography (SECRYPT) 2010, July 26-28, Athens, Greece
-
The International Conference on Security and Cryptography (SECRYPT) 2010, July 26-28, Athens, Greece
-
-
Dörflinger, T.1
Voth, A.2
Krämer, J.3
-
9
-
-
49849102834
-
Beyond the pin: Enhancing user authentication for mobile devices
-
Furnell, S., Clarke, N., and Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud & Security, 2008(8):12-17, 2008.
-
(2008)
Computer Fraud & Security
, vol.2008
, Issue.8
, pp. 12-17
-
-
Furnell, S.1
Clarke, N.2
Karatzouni, S.3
-
10
-
-
80054843510
-
-
IDC press release from 28 Jan at
-
IDC: IDC press release from 28 Jan 2010 at www.idc.com/getdoc.jsp? containerId=prUS22186410
-
(2010)
-
-
-
11
-
-
80054844075
-
Consumer Password Worst Practices
-
Imperva Application Defense Center: at
-
Imperva Application Defense Center: Consumer Password Worst Practices. Imperva 2010 at www.imperva.com/docs/WP-Consumer-Password-Worst-Practices.pdf
-
(2010)
Imperva
-
-
-
13
-
-
84887058303
-
Can I borrow your phone?: Understanding concerns when sharing mobile phones
-
ACM New York, NY, USA
-
Karlson, A., Brush, A., and Schechter, S.: Can I borrow your phone?: Understanding concerns when sharing mobile phones. Proceedings of the 27thinternational conference on Human factors in computing systems, pages 1647-1650. ACM New York, NY, USA, 2009.
-
(2009)
Proceedings of the 27thinternational Conference on Human Factors in Computing Systems
, pp. 1647-1650
-
-
Karlson, A.1
Brush, A.2
Schechter, S.3
-
15
-
-
18144370814
-
Mobile phones: The next frontier for hackers
-
Leavitt, N.: Mobile phones: The next frontier for hackers. IEEE Computer, 38(4): 20-23, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
18
-
-
39349101677
-
Password security: What users know and what they actually do
-
Riley, S.: Password security: what users know and what they actually do. Usability News, 8(1), 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
19
-
-
84964853055
-
Access Control: Policies, Models, and Mechanisms
-
Foundations of Security Analysis and Design
-
Samarati, P. and De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. Lecture Notes in Computer Science, pages 137-196, 2001. (Pubitemid 33364380)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2171
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
22
-
-
80054836206
-
-
Poster: User preferences for biometric authentication methods and graded security on mobile phones
-
Sieger, H., Kirschnick, N., Möller, S.: Poster: User preferences for biometric authentication methods and graded security on mobile phones. Symposium on Usability, Privacy, and Security (SOUPS) 2010
-
Symposium on Usability, Privacy, and Security (SOUPS) 2010
-
-
Sieger, H.1
Kirschnick, N.2
Möller, S.3
-
23
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management and Computer Security, 8(1):31-41, 2000.
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
25
-
-
80054840544
-
-
Examined websites as of early February LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.com
-
Examined websites (as of early February 2011): Apple, Inc.: www.apple.com, LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.com
-
(2011)
-
-
|