Red Button and Yellow Button: Usable Security for Lost Security Tokens.
Ian GoldbergGraeme JenkinsonDavid Llewellyn-JonesFrank StajanoPublished in: Security Protocols Workshop (2016)
Keyphrases
- security systems
- access control
- security requirements
- intrusion detection
- security level
- network security
- security policies
- security properties
- information security
- security issues
- security protocols
- information assurance
- security management
- electronic commerce
- security mechanisms
- functional requirements
- statistical databases
- sensor networks
- security threats
- data sets
- database