Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] backups DELETE command, Windows encrypting data on Balfanz, Dirk Barbi web site, violating informed consent principles behavioral biometrics benchmark studies, setting usability goals benevolence, trustworthiness and Berson, Jordy BHOs (Browser Helper Objects), Bugnosis and binary security model, VPNs biometric authentication 2nd 3rd 4th 5th 6th accessibility factors outlier accommodation applications for 2nd ATMs capture enrolling users face systems fingerprint systems 2nd flaws in handprint systems iris systems key predictability keystroke systems 2nd evaluating tips for producing reliable results market growth in memorability of portable biometric devices privacy/security issues remote retina systems time factor users and acceptance verification techniques biometrics BioPassword Bishop, Matt Blackwell, Alan blocks on free list, overwriting bodystorming, interface design bootstrapping iPKIs and Boyd, Paul breakability, authentication security Briggs, Pamela Bro network-monitoring tool Brodie, Carolyn Browser Helper Objects (BHOs), Bugnosis and Brunk, Benjamin brute force attacks 2nd Bugnosis architecture audience for future directions graphic identity source code theory of operation user alerts web bugs, defining web security, user awareness of bugtraq bulletin boards, sense of community in business sector, security breaches in |