Login / Signup

Eliciting usable security requirements with misusability cases.

Shamal FailyIvan Flechais
Published in: RE (2011)
Keyphrases