Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Kandogan, Eser

Karat, Clare-Marie

Karat, John

KaZaA network 2nd

     access control solutions

     cognitive walkthrough, results of

     design improvements

     file-sharing, unintended

     user configuration, study of

     versions

Ke, Xian

key

     distribution

     pairs, public key cryptography

     rings

         GNU Keyring application

keyboard sniffing attacks

keystroke biometrics 2nd

     applications for

         authentication

     market trends

     research on

         evaluating

         tips for producing reliable results

     scalability

     traditional keyboard, not limited to

keystroke digraphs

keystroke-enhanced login

knowledge-based authentication 2nd

     passwords, writing down

Krekelberg, Aaron

Категории