메뉴 건너뛰기




Volumn , Issue , 2003, Pages 1056-1057

HCI and security systems

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN SOLUTIONS; END-USERS; RESEARCH ACTIVITIES; RESEARCH AND DEVELOPMENT; SYSTEM DEVELOPERS;

EID: 84869031038     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/765891.766146     Document Type: Conference Paper
Times cited : (31)

References (12)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams, A., & Sasse, M.A. (1999). Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42, 41-46.
    • (1999) Communications of the ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 0003429117 scopus 로고    scopus 로고
    • Are Passfaces more usable than passwords? A field trial investigation
    • Sept. 5-8, Sunderland, U.K., Springer
    • Brostoff, S., & Sasse, M.A. (2000). Are Passfaces more usable than passwords? A field trial investigation. In Proceedings of HCI 2000, Sept. 5-8, Sunderland, U.K., 405-424 Springer.
    • (2000) Proceedings of HCI 2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 6
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Joyce, R., & Gupta, G. (1990). Identity authentication based on keystroke latencies. Communications of the ACM, 33, 168-176.
    • (1990) Communications of the ACM , vol.33 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 9
    • 0035387030 scopus 로고    scopus 로고
    • Biometrics-real identities for a virtual world
    • Rejman-Greene, M. (2001). Biometrics-Real identities for a virtual world. BT Technology Journal, 19, 115-121.
    • (2001) BT Technology Journal , vol.19 , pp. 115-121
    • Rejman-Greene, M.1
  • 10
    • 0035387175 scopus 로고    scopus 로고
    • Transformng the 'weakest link': A human/computer interaction approach to usable and effective security
    • Sasse, M.A., Brostoff, S., & Weirich, D. (2001). Transformng the 'weakest link': A human/computer interaction approach to usable and effective security. BT Technology Journal, 19, 122-131.
    • (2001) BT Technology Journal , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 11
    • 0000562870 scopus 로고    scopus 로고
    • Biometrics: Uses and abuses
    • Schneier, B. (1999). Biometrics: Uses and abuses. Communications of the ACM, 42 (8), 58.
    • (1999) Communications of the ACM , vol.42 , Issue.8 , pp. 58
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.