skip to main content
Skip header Section
Secrets and LiesAugust 2004
Publisher:
  • Wiley-VCH
ISBN:978-3-527-50128-1
Published:01 August 2004
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Nicholson J, Coventry L and Briggs P Introducing the cybersurvival task Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, (427-441)
  2. Trono J (2018). CS1 programming assignments that can help to increase awareness of cybersecurity issues, Journal of Computing Sciences in Colleges, 34:2, (80-86), Online publication date: 1-Dec-2018.
  3. ACM
    Mayer P, Kunz A and Volkamer M Reliable Behavioural Factors in the Information Security Context Proceedings of the 12th International Conference on Availability, Reliability and Security, (1-10)
  4. ACM
    Beris O, Beautement A and Sasse M Employee Rule Breakers, Excuse Makers and Security Champions: Proceedings of the 2015 New Security Paradigms Workshop, (73-84)
  5. ACM
    Nostro N, Ceccarelli A, Bondavalli A and Brancati F (2014). Insider Threat Assessment, ACM SIGOPS Operating Systems Review, 48:2, (3-12), Online publication date: 5-Dec-2014.
  6. Leitner M and Rinderle-Ma S (2014). A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions, Information and Software Technology, 56:3, (273-293), Online publication date: 1-Mar-2014.
  7. ACM
    Nostro N, Ceccarelli A, Bondavalli A and Brancati F A methodology and supporting techniques for the quantitative assessment of insider threats Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, (1-6)
  8. Kordy B, Mauw S, Melissen M and Schweitzer P Attack-defense trees and two-player binary zero-sum extensive form games are equivalent Proceedings of the First international conference on Decision and game theory for security, (245-256)
  9. ACM
    Edwards W, Poole E and Stoll J Security automation considered harmful? Proceedings of the 2007 Workshop on New Security Paradigms, (33-42)
  10. ACM
    Gross J and Rosson M Looking for trouble Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, (10-es)
  11. Toledano D, Fernández Pozo R, Hernández Trapote Á and Hernández Gómez L (2019). Usability evaluation of multi-modal biometric verification systems, Interacting with Computers, 18:5, (1101-1122), Online publication date: 1-Sep-2006.
  12. ACM
    Flechais I, Riegelsberger J and Sasse M Divide and conquer Proceedings of the 2005 workshop on New security paradigms, (33-41)
  13. ACM
    De Palma P, Frank C, Gladfelter S and Holden J (2004). Cryptography and computer security for undergraduates, ACM SIGCSE Bulletin, 36:1, (94-95), Online publication date: 1-Mar-2004.
  14. ACM
    Wright T (2004). Security, privacy, and anonymity, XRDS: Crossroads, The ACM Magazine for Students, 11:2, (5-5), Online publication date: 1-Dec-2004.
  15. ACM
    De Palma P, Frank C, Gladfelter S and Holden J Cryptography and computer security for undergraduates Proceedings of the 35th SIGCSE technical symposium on Computer science education, (94-95)
  16. Khare R and Taylor R Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems Proceedings of the 26th International Conference on Software Engineering, (428-437)
  17. Payne C Enhanced Security Models for Operating Systems Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01, (230-235)
  18. ACM
    Gelbord B On the use of PKI technologies for secure and private e-learning environments Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning, (568-572)
  19. Ince D (2019). Eight Desert Island Books, Automated Software Engineering, 8:3-4, (355-358), Online publication date: 1-Aug-2001.
  20. ACM
    Brostoff S and Sasse M Safe and sound Proceedings of the 2001 workshop on New security paradigms, (41-50)
  21. ACM
    Weirich D and Sasse M Persuasive password security CHI '01 Extended Abstracts on Human Factors in Computing Systems, (139-140)
  22. ACM
    Salter C, Saydjari O, Schneier B and Wallner J Toward a secure system engineering methodolgy Proceedings of the 1998 workshop on New security paradigms, (2-10)
Contributors
  • Harvard University

Recommendations