Login / Signup

Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.

Cynthia KuoAdrian PerrigJesse Walker
Published in: Interactions (2006)
Keyphrases