Login / Signup
From Usability to Secure Computing and Back Again.
Lucy Qin
Andrei Lapets
Frederick Jansen
Peter Flockhart
Kinan Dak Albab
Ira Globus-Harris
Shannon Roberts
Mayank Varia
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
databases
data sets
artificial intelligence
distributed systems
access control
lightweight
user experience
security mechanisms
cryptographic protocols
authentication scheme
identity management
usability evaluation