K


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Kandogan, Eser
Karat, Clare-Marie
Karat, John
KaZaA network 2nd
     access control solutions
     cognitive walkthrough, results of
     design improvements
     file-sharing, unintended
     user configuration, study of
     versions
Ke, Xian
key
     distribution
     pairs, public key cryptography
     rings
         GNU Keyring application
keyboard sniffing attacks
keystroke biometrics 2nd
     applications for
         authentication
     market trends
     research on
         evaluating
         tips for producing reliable results
     scalability
     traditional keyboard, not limited to
keystroke digraphs
keystroke-enhanced login
knowledge-based authentication 2nd
     passwords, writing down
Krekelberg, Aaron



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net