Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] random passwords authentication time centrally assigned meaningfulness of memorability of predictability of Rapid Assessment tool, Groove Virtual Office recall knowledge-based authentication keys uncued/cued recognition authentication mechanism based on inclusivity picture effect, graphical passwords and retrieval strategy for graphical passwords recovery, step in privacy process Reiter, Michael Renaud, Karen repeatability, challenge questions system reputation systems, trust design element requirements phase, product development research-based attacks response, step in privacy process retina verification, biometrics authentication retrieval strategies, memorability and return on investment (ROI) analysis, case study of security application rings, multiple, security model for Internet risks managing, decision-making process and risk and threat analysis ROI (return on investment) analysis, case study of security application rootkits hunting Ross, Blake |