G


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

gambling sites, trusted design example
gaming/anti-gaming
Garfinkel, Simson L.
gesture-directed automatic configuration
Gmail (Google)
     informed consent
GNU Keyring application
GnuPG
Gnutella network 2nd
Goecks, Jeremy
GOL (Government OnLine)
Good, Nathaniel
Goverment OnLine (GOL)
graduated lockout feature, challenge questions systems
Grant, Alasdair
graphical authentication 2nd
     DAS
     position-based
     recognition-based
graphical password systems
     tapping/drawing images
graphical passwords 2nd
     abundance of
     authentication time
     creating systems using
         image-interpretation technique
         image-recognition technique
     drawbacks
     evaluating security of
         authentication schemes
         key-generation schemes
     evaluating usability of
     guessing
     key-generation systems and 2nd
     meaningfulness of
     predictability of
     retrieval strategy
     system-generated
     user-selected
guessing difficulty, security criterion for challenge questions system
GUIs (graphical user interfaces)
     conventions
     secure system design
     security mechanisms and
GVO (Groove Virtual Office)
     design
         core principles



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net