Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion).
Frank StajanoPublished in: Security Protocols Workshop (2016)
Keyphrases
- security policies
- security requirements
- access control
- network security
- information security
- intrusion detection
- information assurance
- security properties
- computer security
- key management
- data sets
- security systems
- security protocols
- neural network
- statistical databases
- data mining
- video sequences
- wireless sensor networks
- network management
- sensitive data
- encryption scheme
- security analysis
- case study
- data security
- security model
- cyber attacks
- security level
- security threats
- digital images