Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] DARPA (Defense Advanced Research Projects Agency), biometric research DAS (Draw-a-Secret) graphical authentication Defense Advanced Research Projects Agency (DARPA), biometric research Déjà Vu DELETE command/Delete key, Windows 2nd backups Delphi method, validating Privacy Space Framework Department of Defense sanitization standards depth of processing, authentication memorability design for usability phase, product development results of data analysis designation, security by designing secure systems 2nd 3rd 4th actual security versus theoretical 2nd biometric authentication challenges 2nd checklist conceptual approach Groove Virtual Office HCI methods/usability 2nd hybrid approaches informed consent by Internet, building secure minimizing user effort Mozilla Firefox PKIs privacy management systems social practice, supporting 2nd system requirements trust issues ubiquitous computing user accommodation user customization user goal orientation user privacy concerns user walkthroughs user-centered value-sensitive with challenge questions desktop security detection features, step in privacy process detection tools Dey, Anind K. DHT (distributed hash tables) dictionary attacks 2nd Diffie-Hellman/DSS algorithms digital rights management, keystroke biometrics digital signatures on patches PGP v5.0 Dingledine, Roger directly addressable user data Disappearing Ink disclosure ambiguous authentication security function, cell phones function, portable devices informed consent model user awareness and distributed hash tables (DHT) Document Object Model (DOM), Bugnosis architecture and Dodgeball.com web site, privacy regulation, integrating DOM (Document Object Model), Bugnosis architecture and domain names, phishing attacks and Domino applications DOS 5.0, UNFORMAT utility DoubleClick, Inc. dual-code theory, picture effect Durfee, Glenn |