Security and Usability Engineering with Particular Attention to Electronic Mail (2005)

Cached

Download Links

by Volker Roth , Tobias Straub , Kai Richter
Citations:3 - 1 self

Documents Related by Co-Citation

1 How to fend off shoulder surfers – Volker Roth, Kai Richter - 2006
1 A Ring to Rule Them All, Secure and Usable Pairing With a Human Sampling Function. February 2007. Under submission – Volker Roth, Wolfgang Polak, Eleanor Rieffel
2 Pedran Keyani, Mary Czerwinsky: Spy-resistant keyboard: more secure password entry on public touch screen display, OZCHI’05 – Desney S Tan - 2005
42 A PIN-entry method resiliant against shoulder surfing – V Roth, K Richter, R Freidinger - 2001
90 Loud and clear: Human-verifiable authentication based on audio – Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun - 2006
50 Usability analysis of secure pairing methods – Ersin Uzun, Kristiina Karvonen, N. Asokan - 2007
3 Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols – H I Bulbul, I Batmaz, M Ozel - 2008
2 On Malicious Software Classification – J Lin - 2008
2 An Intruder Model for Verifying Liveness – J Cederquist, M Dashti - 2006
1 Business Data Communications – M Agrawal - 2011
1 Internet as a multiple graph structure: The role of the transport layer – J A Audestad - 2007
1 Some IP security issues – Z Bojkovic - 2008
1 Protecting confidential information from malicious software – K Borders - 2009
1 Detecting Malicious Software by Dynamic Execution – J Dai - 2009
1 Security issues with the IP multimedia subsystem – M T Hunter, R J Clark, F S Park - 2007
1 Capturing an Intruder in Product Networks – N Imani, H Sarbazi-Azad, A Y Zomaya - 2007
1 Mobile IP Security and Scalable Support for Host Mobility on the Internet – M C Niculescu, E Niculescu, I Resceanu - 2007
1 Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security – N Sklavos, P Kitsos, K Papadopoulos, O Koufopavlou - 2006
1 Foundstone Practices, Available: http://www.foundstone.com – McAfee SuperScan