R


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

random passwords
     authentication time
     centrally assigned
     meaningfulness of
     memorability of
     predictability of
Rapid Assessment tool, Groove Virtual Office
recall
     knowledge-based authentication keys
     uncued/cued
recognition
     authentication mechanism based on
         inclusivity
     picture effect, graphical passwords and
     retrieval strategy for graphical passwords
recovery, step in privacy process
Reiter, Michael
Renaud, Karen
repeatability, challenge questions system
reputation systems, trust design element
requirements phase, product development
research-based attacks
response, step in privacy process
retina verification, biometrics authentication
retrieval strategies, memorability and
return on investment (ROI) analysis, case study of security application
rings, multiple, security model for Internet
risks
     managing, decision-making process and
     risk and threat analysis
ROI (return on investment) analysis, case study of security application
rootkits
     hunting
Ross, Blake



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net