Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] gambling sites, trusted design example gaming/anti-gaming Garfinkel, Simson L. gesture-directed automatic configuration Gmail (Google) informed consent GNU Keyring application GnuPG Gnutella network 2nd Goecks, Jeremy GOL (Government OnLine) Good, Nathaniel Goverment OnLine (GOL) graduated lockout feature, challenge questions systems Grant, Alasdair graphical authentication 2nd DAS position-based recognition-based graphical password systems tapping/drawing images graphical passwords 2nd abundance of authentication time creating systems using image-interpretation technique image-recognition technique drawbacks evaluating security of authentication schemes key-generation schemes evaluating usability of guessing key-generation systems and 2nd meaningfulness of predictability of retrieval strategy system-generated user-selected guessing difficulty, security criterion for challenge questions system GUIs (graphical user interfaces) conventions secure system design security mechanisms and GVO (Groove Virtual Office) design core principles |