Loading...
Integrating a usable security protocol into user authentication services design process /
"There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is p...
Main Author: | Braz, Christina |
---|---|
Other Authors: | Naqvi, Syed |
Format: | Printed Book |
Published: |
Boca Raton
CRC Press
2019
|
Edition: | First edition. |
Subjects: |
Similar Items
-
Biometrics for network security /
by: Reid, Paul
Published: (2004) -
Protocols for authentication and key establishment /
by: Boyd, Colin
Published: (2003) -
Usability engineering
by: Nielsen
Published: (1993) -
SIP handbook:services,technologies,and security of session initiation protocol
by: Ahson, Syed A
Published: (2009) -
Advance Internet Protocols, Services and Applications /
by: Oki, Eiji
Published: (2012)