Chapter 6: Evaluating Authentication Mechanisms Chapter 7: The Memorability and Security of Passwords Chapter 8: Designing Authentication Systems with Challenge Questions Chapter 9: Graphical Passwords Chapter 10: Usable Biometrics Chapter 11: Identifying Users from Their Typing Patterns Chapter 12: The Usability of Security Devices
Chapter 6: Evaluating Authentication Mechanisms
Chapter 7: The Memorability and Security of Passwords
Chapter 8: Designing Authentication Systems with Challenge Questions
Chapter 9: Graphical Passwords
Chapter 10: Usable Biometrics
Chapter 11: Identifying Users from Their Typing Patterns
Chapter 12: The Usability of Security Devices