Security and Usability: Designing Secure Systems That People Can Use
| Chapter 6: Evaluating Authentication Mechanisms Chapter 7: The Memorability and Security of Passwords Chapter 8: Designing Authentication Systems with Challenge Questions Chapter 9: Graphical Passwords Chapter 10: Usable Biometrics Chapter 11: Identifying Users from Their Typing Patterns Chapter 12: The Usability of Security Devices
|