-
1
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Dec.
-
A. Adams and M. A. Sasse. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42(12):40-46, Dec. 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
84872111815
-
-
Adobe Systems Inc
-
Adobe Systems Inc. PhoneGap. http://phonegap.com.
-
-
-
-
3
-
-
51449101276
-
Multi-biometric cohort analysis for biometric fusion
-
Las Vegas, NV
-
G. Aggarwal, N. K. Ratha, R. M. Bolle, and R. Chellappa. Multi-biometric cohort analysis for biometric fusion. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Las Vegas, NV, 2008.
-
(2008)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Aggarwal, G.1
Ratha, N.K.2
Bolle, R.M.3
Chellappa, R.4
-
7
-
-
80054834322
-
Smart phone use by non-mobile business users
-
Stockholm, Sweden
-
P. Bao, J. Pierce, S. Whittaker, and S. Zhai. Smart phone use by non-mobile business users. In MobileHCI, Stockholm, Sweden, 2011.
-
(2011)
MobileHCI
-
-
Bao, P.1
Pierce, J.2
Whittaker, S.3
Zhai, S.4
-
11
-
-
81055156896
-
A closer look at recognition-based graphical passwords on mobile devices
-
Redmond,WA
-
P. Dunphy, A. P. Heiner, and N. Asokan. A closer look at recognition-based graphical passwords on mobile devices. In SOUPS, Redmond,WA, 2010.
-
(2010)
SOUPS
-
-
Dunphy, P.1
Heiner, A.P.2
Asokan, N.3
-
12
-
-
35348884906
-
A large-scale study of web password habits
-
Banff, Canada
-
D. Florencio and C. Herley. A large-scale study of web password habits. In WWW, Banff, Canada, 2007.
-
(2007)
WWW
-
-
Florencio, D.1
Herley, C.2
-
13
-
-
84865041518
-
Where do security policies come from?
-
Redmond, WA
-
D. Florêncio and C. Herley. Where do security policies come from? In SOUPS, Redmond, WA, 2010.
-
(2010)
SOUPS
-
-
Florêncio, D.1
Herley, C.2
-
14
-
-
78650267408
-
Usability evaluation of voiceprint authentication in automated telephone banking: Sentences versus digits
-
Jan.
-
N. Gunson, D. Marshall, F. McInnes, and M. Jack. Usability evaluation of voiceprint authentication in automated telephone banking: Sentences versus digits. Interacting with Computers, 23(1):57-69, Jan. 2011.
-
(2011)
Interacting with Computers
, vol.23
, Issue.1
, pp. 57-69
-
-
Gunson, N.1
Marshall, D.2
McInnes, F.3
Jack, M.4
-
15
-
-
48249102424
-
Multimodal face and speaker identification for mobile devices
-
R. I. Hammoud, B. R. Abidi, and M. A. Abidi, editors, Springer
-
T. J. Hazen, E. Weinstein, B. Heisele, A. Park, and J. Ming. Multimodal face and speaker identification for mobile devices. In R. I. Hammoud, B. R. Abidi, and M. A. Abidi, editors, Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems. Springer, 2007.
-
(2007)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems
-
-
Hazen, T.J.1
Weinstein, E.2
Heisele, B.3
Park, A.4
Ming, J.5
-
18
-
-
84874561028
-
Implicit authentication for mobile devices
-
Montreal, Canada
-
M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit authentication for mobile devices. In HotSec, Montreal, Canada, 2009.
-
(2009)
HotSec
-
-
Jakobsson, M.1
Shi, E.2
Golle, P.3
Chow, R.4
-
23
-
-
84872108550
-
One in three experience mobile device loss or theft
-
M. Lennon. One in Three Experience Mobile Device Loss or Theft. Do People in 'Party Cities' Lose More Phones?, 2011. http://www.securityweek.com/one- three-experience-mobile-device-loss-ortheft-do-people-party-cities-lose-more- phones.
-
(2011)
Do People in 'Party Cities' Lose More Phones?
-
-
Lennon, M.1
-
25
-
-
80051471133
-
Interaction in 4-second bursts: The fragmented nature of attentional resources in mobile hci
-
Portland, OR
-
A. Oulasvirta, S. Tamminen, V. Roto, and J. Kuorelahti. Interaction in 4-second bursts: the fragmented nature of attentional resources in mobile hci. In CHI, Portland, OR, 2005.
-
(2005)
CHI
-
-
Oulasvirta, A.1
Tamminen, S.2
Roto, V.3
Kuorelahti, J.4
-
26
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, Apr. 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
27
-
-
84872114605
-
-
J. Sauro. Measuring usability with the System Usability Scale (SUS), 2011. http://www.measuringusability.com/sus.php.
-
(2011)
-
-
Sauro, J.1
-
32
-
-
33748916060
-
Usability evaluation of multi-modal biometric verification systems
-
DOI 10.1016/j.intcom.2006.01.004, PII S0953543806000348
-
D. T. Toledano, R. Fernández Pozo, A. Hernández Trapote, and L. Hernández Gómez. Usability evaluation of multi-modal biometric verification systems. Interacting with Computers, 18(5):1101-1122, Sept. 2006. (Pubitemid 44428163)
-
(2006)
Interacting with Computers
, vol.18
, Issue.5
, pp. 1101-1122
-
-
Toledano, D.T.1
Fernandez Pozo, R.2
Hernandez Trapote, A.3
Hernandez Gomez, L.4
-
34
-
-
80054939522
-
Biometrics score fusion through discriminative training
-
V. Tyagi and N. Ratha. Biometrics score fusion through discriminative training. CVPR Workshop on Biometrics, 2011.
-
(2011)
CVPR Workshop on Biometrics
-
-
Tyagi, V.1
Ratha, N.2
|