User-Centric IT Security - How to Design Usable Security Mechanisms.
Hans-Joachim HofPublished in: CoRR (2015)
Keyphrases
- security mechanisms
- user centric
- security issues
- security problems
- security systems
- security requirements
- access control
- resource constrained
- network centric
- security measures
- cryptographic algorithms
- security services
- smart card
- information security
- operating system
- security protocols
- embedded systems
- intrusion detection
- user interface
- mobile devices