共 17 条
[1]
[Anonymous], 2014, PROTECTING YOUR ORG
[2]
[Anonymous], 2008, GRAND CHALLENGES ENG
[3]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:553-567
[4]
Bravo-Lillo C., 2013, P 9 S USABLE PRIVACY, P6, DOI [DOI 10.1145/2501604.2501610, 10.1145]
[5]
The Warfighter Associate: Decision-support software agent for the management of intelligence, surveillance, and reconnaissance (ISR) assets
[J].
GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR V,
2014, 9079
[6]
Cranor L.F., 2005, SECURITY USABILITY
[7]
Cranor LF, 2008, P 1 C US PSYCH SEC U, P1, DOI DOI 10.5555/1387649.1387650
[8]
Egelman S, 2008, CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P1065
[9]
Gay G., 2004, ACTIVITY CTR DESIGN
[10]
Goldstein DG, 2008, HARVARD BUS REV, V86, P99