共 50 条
- [31] Eliciting Usable Security Requirements with Misusability Cases 2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 339 - 340
- [33] How WEIRD is Usable Privacy and Security Research? PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3241 - 3258
- [34] A Set of Heuristics for Usable Security and User Authentication PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
- [36] Towards Automatic Creation of Usable Security Configuration 2010 PROCEEDINGS IEEE INFOCOM, 2010,
- [38] Red Button and Yellow Button: Usable Security for Lost Security Tokens SECURITY PROTOCOLS XXIV, 2017, 10368 : 165 - 171
- [40] Usable Security Management with Host Identity Protocol 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 279 - 286