On the Security and Usability of Crypto Phones.
Maliheh ShirvanianNitesh SaxenaPublished in: ACSAC (2015)
Keyphrases
- security protocols
- security mechanisms
- private key
- mobile phone
- intrusion detection
- information security
- computer security
- information assurance
- security issues
- rfid systems
- access control
- statistical databases
- security policies
- security systems
- security level
- security threats
- security requirements
- security analysis
- network security
- user experience
- security measures
- key management
- usability testing
- usability evaluation