Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption.
Hans-Joachim HofPublished in: CoRR (2015)
Keyphrases
- security mechanisms
- resource constrained
- digital signature
- security issues
- access control
- cryptographic algorithms
- smart card
- security threats
- security systems
- security problems
- security requirements
- operating system
- public key infrastructure
- security protocols
- payment systems
- embedded systems
- information security
- case study
- database
- resource constraints
- data analysis