National e-ID card schemes: A European overview, Information Security Technical Report, vol.13, issue.2, pp.46-53, 2008. ,
DOI : 10.1016/j.istr.2008.08.002
Smart Cards and Digital Security, Computer Network Security, vol.1, pp.42-56, 2007. ,
DOI : 10.1007/978-3-540-73986-9_4
Utilizing smart cards for authentication and compliance tracking in a diabetes case management system, Proceedings of the 46th Annual Southeast Regional Conference on XX, ACM-SE 46, pp.521-522, 2008. ,
DOI : 10.1145/1593105.1593246
Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006. ,
DOI : 10.1145/1180405.1180427
Security and usability, Proceedings of the 18th international conference on Association Francophone d'Interaction Homme-Machine , IHM '06, pp.199-203, 2006. ,
DOI : 10.1145/1132736.1132768
A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.657-666, 2007. ,
DOI : 10.1145/1242572.1242661
So long, and no thanks for the externalities, Proceedings of the 2009 workshop on New security paradigms workshop, NSPW '09, 2009. ,
DOI : 10.1145/1719030.1719050
The true cost of unusable password policies, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.383-392, 2010. ,
DOI : 10.1145/1753326.1753384
Identity, credential, and access management at NASA, from Zachman to attributes, Proceedings of the 8th Symposium on Identity and Trust on the Internet, IDtrust '09, pp.1-14, 2009. ,
DOI : 10.1145/1527017.1527019
Implicit Authentication for Mobile Devices, proceedings of USENIX Workshop on HotSec, 2009. ,
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.114-121, 2006. ,
DOI : 10.1145/1143120.1143135
Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, pp.433-446, 2010. ,
DOI : 10.1109/SP.2010.33
Comparing Passwords, Tokens, and Biometrics for User Authentication, Proc. IEEE 2003, pp.2019-2040, 2003. ,
A Task Analysis of Usability in Third-Party Authentication, Information Security Bulletin, vol.5, issue.3, pp.49-56, 2000. ,
Transforming the 'Weakest Link' - a Human-Computer Interaction Approach to Usable and Effective security, BT Technology Journal, vol.19, issue.3, pp.122-131, 2001. ,
DOI : 10.1049/PBBT004E_ch15
Usability and Trust in Information Systems. Cyber Trust & Crime Prevention Project, 2004. ,
The Emperor's New Security Indicators, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.51-65, 2007. ,
DOI : 10.1109/SP.2007.35
It's not what you know, but who you know: a social approach to last-resort authentication, Proc. ACM CHI 2009, 1983. ,
DOI : 10.1145/1572532.1572581
Productivity and Usability Effects of Using a Two-Factor Security System, proceedings of SAIS, pp.196-201, 2009. ,
Password policy: the good, the bad, and the ugly, proceedings of WISICT 2004, pp.1-6, 2004. ,
Usable security: User preferences for authentication methods in eBanking and the effects of experience, Interacting with Computers, vol.22, issue.3, pp.153-164, 2010. ,
DOI : 10.1016/j.intcom.2009.10.001