Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Do users' perceptions of password security match reality?
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …
passwords are predictable is not well understood. We investigate the relationship between …
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …
security of single-factor and two-factor authentication methods in automated telephone …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
“Nah, it's just annoying!” A deep dive into user perceptions of two-factor authentication
Two-factor authentication (2FA) is a recommended or imposed authentication mechanism
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …
for valuable online assets. However, 2FA mechanisms usually exhibit user experience …
System and method for assessing cybersecurity awareness
Described embodiments include a system that includes a monitoring agent, configured to
automatically monitor usage of a computing device by a user, and a processor. The …
automatically monitor usage of a computing device by a user, and a processor. The …
[PDF][PDF] A web of things application architecture: Integrating the real-world into the web
D Guinard - 2011 - research-collection.ethz.ch
A central concern in the area of pervasive computing has been the integration of digital
artifacts with the physical world and vice-versa. Recent developments in the field of …
artifacts with the physical world and vice-versa. Recent developments in the field of …
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
This paper proposes using a 2D waveguide for a novel means of authentication in public Wi-
Fi infrastructures. The design of the system is presented, and its practicability and usability is …
Fi infrastructures. The design of the system is presented, and its practicability and usability is …
Behavior change interventions for cybersecurity
While behavior change methods have become relatively commonplace in the health
domain, they have only recently been applied to the cybersecurity field. In this chapter we …
domain, they have only recently been applied to the cybersecurity field. In this chapter we …