Loading...
Integrating a usable security protocol into user authentication services design process /
"There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is p...
Main Author: | |
---|---|
Other Authors: | |
Format: | Printed Book |
Published: |
Boca Raton
CRC Press
2019
|
Edition: | First edition. |
Subjects: |