CSC8417 assignment 3 Web Services:Security

作者: David Sale

DOI:

关键词:

摘要:

参考文章(15)
Tara Whalen, Kori M. Inkpen, Gathering evidence: use of visual security cues in web browsers graphics interface. pp. 137- 144 ,(2005)
M A Sasse, S Brostoff, D Weirich, Transforming the 'Weakest Link' — a Human/Computer Interaction Approach to Usable and Effective Security Bt Technology Journal. ,vol. 19, pp. 122- 131 ,(2001) , 10.1023/A:1011902718709
R.B. Paranjape, J. Mahovsky, L. Benedicenti, Z. Koles', The electroencephalogram as a biometric canadian conference on electrical and computer engineering. ,vol. 2, pp. 1363- 1366 ,(2001) , 10.1109/CCECE.2001.933649
Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly, Secrecy, flagging, and paranoia: adoption criteria in encrypted email human factors in computing systems. pp. 591- 600 ,(2006) , 10.1145/1124772.1124862
Bogdan Hoanca, Kenrick Mock, Secure graphical password system for high traffic public areas eye tracking research & application. pp. 35- 35 ,(2006) , 10.1145/1117309.1117319
Thomas S. Tullis, Donna P. Tedesco, Using personal photos as pictorial passwords CHI '05 extended abstracts on Human factors in computing systems - CHI '05. pp. 1841- 1844 ,(2005) , 10.1145/1056808.1057036
Volker Roth, Kai Richter, Rene Freidinger, A PIN-entry method resilient against shoulder surfing computer and communications security. pp. 236- 245 ,(2004) , 10.1145/1030083.1030116
Julie Thorpe, P. C. van Oorschot, Anil Somayaji, Pass-thoughts: authenticating with our minds new security paradigms workshop. pp. 45- 56 ,(2005) , 10.1145/1146269.1146282