default search action
18th HCI 2016: Toronto, ON, Canada
- Theo Tryfonas:
Human Aspects of Information Security, Privacy, and Trust - 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Lecture Notes in Computer Science 9750, Springer 2016, ISBN 978-3-319-39380-3
Human Factors of Authentication
- Oliver Buckley, Duncan Hodges:
User Identification Using Games. 3-14 - Kulpreet Chilana, Federico Casalegno:
Hermes: Hands-Free Authentication in Physical Spaces. 15-24 - Jonathan Gurary, Ye Zhu, Nahed Alnahash, Huirong Fu:
Implicit Authentication for Mobile Devices Using Typing Behavior. 25-36 - Verena M. I. A. Hartl, Ulrike Schmuntzsch:
Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings Due to Social Engineering and Inobservance Whilst Operating with Personal Login Credentials. 37-47 - Donghan Park, Hyunseung Choo:
Vibration Based Tangible Tokens for Intuitive Pairing Among Smart Devices. 48-56 - Fatema Rashid, Ali Miri:
Anonymous Authentication with a Bi-directional Identity Federation in the Cloud. 57-64 - Paulo Realpe-Muñoz, César A. Collazos, Julio Ariel Hurtado, Toni Granollers, Jaime Velasco-Medina:
An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010: 2011. 65-76 - Takashi Tsuchiya, Masahiro Fujita, Kenta Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks. 77-88
Security, Privacy and Human Bevahiour
- Maha Aljohani, Kirstie Hawkey, James Blustein:
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act. 91-102 - Ranjan Bhattarai, Ger Joyce, Saurabh Dutta:
Information Security Application Design: Understanding Your Users. 103-113 - Andrew Blyth:
Responsibility Modelling and Its Application Trust Management. 114-127 - Tesleem Fagade, Theo Tryfonas:
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks. 128-139 - Yasser M. Hausawi:
Current Trend of End-Users' Behaviors Towards Security Mechanisms. 140-151 - Teresa Schmidt, Ralf Philipsen, Martina Ziefle:
Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology. 152-163 - Samuel N. Smith, Fiona Fui-Hoon Nah, Maggie X. Cheng:
The Impact of Security Cues on User Perceived Security in e-Commerce. 164-173 - Theo Tryfonas, Michael Carter, Tom Crick, Panagiotis Andriotis:
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks. 174-185 - Meredydd Williams, Jason R. C. Nurse:
Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective. 186-197
Security Technologies
- Waqas Aman:
Assessing the Feasibility of Adaptive Security Models for the Internet of Things. 201-211 - Daniel Csubak, Attila Kiss:
OpenStack Firewall as a Service Rule Analyser. 212-220 - George Kalpakis, Theodora Tsikrika, Christos Iliou, Thodoris Mironidis, Stefanos Vrochidis, Jonathan Middleton, Una Williamson, Ioannis Kompatsiaris:
Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes. 221-233 - Florian Kammüller, Jason R. C. Nurse, Christian W. Probst:
Attack Tree Analysis for Insider Threats on the IoT Using Isabelle. 234-246 - Jaromir Karmazin, Pavel Ocenasek:
The State of Near-Field Communication (NFC) on the Android Platform. 247-254 - Jason R. C. Nurse, Ahmad Atamli, Andrew P. Martin:
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. 255-267 - Karla Susiane Pereira, Eduardo Feitosa, Tayana Conte:
A Taxonomy to Classify Risk End-User Profile in Interaction with the Computing Environment. 268-276 - Peter Vörös, Attila Kiss:
Security Middleware Programming Using P4. 277-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.