„Usable Security“
Suchergebnisse
1.000+ Treffer
-
Financial Cryptography and Data Security – 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers
-
Privacy preserving data management – assisting users in data disclosure scenarios
-
Privacy Preserving Data Management – Assisting Users in Data Disclosure Scenarios
-
Social Engineering and Human Hacking – Strategies for the Prevention and Defense Against Manipulation Techniques in IT
-
Social Engineering und Human Hacking – Strategien zur Prävention und Abwehr von Manipulationstechniken in der IT
-
Human Factors on Secret Security: Case Studies on Code Secret Leakage, Cryptographic Updates, and Password Update Procedures
-
Usable privacy and security in smart homes
-
On the experiences and challenges of recruiting expert samples for security studies: case studies with software developers, machine learning practitioners and Open-Source software developers
-
Perceived security and usage of a mobile payment application
-
Broadening the scope of security usability from the individual to the organizational – participation and interaction for effective, efficient, and agile authorization [[Elektronische Ressource]]
-
The tension of usable safety, security and privacy
-
Usable privacy and security
-
Financial Cryptography and Data Security – FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
-
10. Usable Security und Privacy Workshop
-
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics
-
8. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen: Ausnahmezustand
-
Privacy Considerations for Risk-Based Authentication Systems
-
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics
-
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication
-
Evaluation of Risk-based Re-Authentication Methods