Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Kandogan, Eser Karat, Clare-Marie Karat, John KaZaA network 2nd access control solutions cognitive walkthrough, results of design improvements file-sharing, unintended user configuration, study of versions Ke, Xian key distribution pairs, public key cryptography rings GNU Keyring application keyboard sniffing attacks keystroke biometrics 2nd applications for authentication market trends research on evaluating tips for producing reliable results scalability traditional keyboard, not limited to keystroke digraphs keystroke-enhanced login knowledge-based authentication 2nd passwords, writing down Krekelberg, Aaron |