Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] TANs (transaction authorization numbers) approach to online banking authentication mechanism tap regions, graphical authentication tasks analysis of core, scenarios validated/updated ease of use, influence of flow, validated user model privacy implications, user understanding of production versus supporting varying security with testing benchmark studies, setting usability goals design/usability of user interface empirical usability laboratory studies exploits on isolated systems security mechanisms usability user-interface prototypes The Anonymizer third-party cookies threat analysis Thunderwire, CSCW research study TLS (Transport Layer Security) Tognazzini, Bruce "Tog" tokens authentication based on 2nd biometric verification and P3P compact policy tools antiphishing automated, user control of personal information awareness/detection Bugnosis code samples, vulnerability detection 2nd communications, coordinating security administrator efforts disk repair utilities, securing file access file/host integrity for finding patches for security administration forensic hacking honeypots HTTP logs information management integration of, need for monitoring analyzing network logs 2nd networks in real time MOO 2nd 3rd network intrusion alert, case study privacy awareness, Bugnosis future directions public information sources for recognizing/removing adware/spyware remote data collection/system evaluation rootkit hunters 2nd scanning 2nd 3rd web logs search utilities, file access security session logs trapping hackers visualization Tor networks transaction authorization numbers (TANs) approach to online banking authentication mechanism transitive trust Transport Layer Security (TLS) Trash Can icon, user interface error in Mac OS 10.3 Tresor 2.2 Tribe.net web site, user-controlled information flow Trojan horses, patch distribution and trust 2nd 3rd authentication and beliefs about trustworthiness context of credibility and 2nd decisions about, user control of designs promoting examples disposition to exploiting, phishing attacks and hard trust/soft trust informed consent and layers of models of iPKIs and on eBay personal information handling, communicating policies situational Solaris trusted stripe time-course of transitive user-generated keys and users and trust-risk relationship e-commerce transactions high risk/low trust model technology factors two-factor authentication Tygar, Doug Type I networks typing verification, keystroke biometrics |