共 16 条
- [1] A Set of Heuristics for Usable Security and User Authentication PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
- [4] Usable Security of Authentication Process: New Approach and Practical Assessment 2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 179 - 180
- [5] Exploring User-Centered Security Design for Usable Authentication Ceremonies CHI '21: PROCEEDINGS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2021,
- [9] Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices Annals of Telecommunications, 2023, 78 : 209 - 220