Integrating a Usable Security Protocol into User Authentication Services Design Process More Books Like This
Human Aspects of Information Security, Privacy, and Trust
2016
HCI for Cybersecurity, Privacy and Trust
2019
Human Aspects of Information Security, Privacy, and Trust
2015
Emerging Technologies for Authorization and Authentication
2018
Trust, Privacy and Security in Digital Business
2017
Information Systems Security and Privacy
2019
Emerging Technologies for Authorization and Authentication
2020
Information Systems Security and Privacy
2020
Emerging Technologies for Authorization and Authentication
2022
Computer Security
2020
Trust, Privacy and Security in Digital Business
2015
ICT Systems Security and Privacy Protection
2019
Emerging Information Security and Applications
2022
Technology and Practice of Passwords
2016
Trust, Privacy and Security in Digital Business
2019