Results 311 to 320 of about 247,400 (347)
Some of the next articles are maybe not open access.

The Usable Security Case

2016
Security mechanisms are of critical importance in today’s interactive systems. While the primary goal of such mechanisms is to preserve security of information and premises, researchers and practitioners have come to understand the critical importance of usable security which is an area focusing on how to design and develop security mechanisms that ...
Panagiotis Germanakos, Marios Belk
openaire   +1 more source

Usable presentation of secure pseudonyms

Proceedings of the 2005 workshop on Digital identity management, 2005
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name.
Katrin Borcea-Pfitzmann   +2 more
openaire   +1 more source

Security Usability: Human, Computer, and Security Interaction

2019
This chapter presents the security usability problem in the context of Internet of Things (IoT). The technician installing his home security system had very little understanding about how computer systems and networks work. The chapter explores the challenges of security usability and principles for designing usable security as it pertains to IoT ...
David M. Wheeler   +2 more
openaire   +1 more source

Security and Usability

2022
Jing Chen, Marcus Wong, Lijia Zhang
openaire   +1 more source

The usability of security – revisited

Computer Fraud & Security, 2016
One of the long-standing challenges around security technology has been to ensure it is provided in a manner that is usable for the target audience. Usability in this context encompasses several underlying factors, including the need to be understandable for users and to avoid being unnecessarily intrusive or introduce undue performance overheads ...
openaire   +1 more source

Secure, Usable Biometric Authentication Systems

2013
Biometrics are physiological features that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irises. A common use of biometric systems is to authenticate users desiring access to a system or resource. Universal Access can be promoted with biometrics. Biometrics provide a secure way to access information technology,
Liam M. Mayron   +2 more
openaire   +1 more source

Balancing Usability and Security

This chapter examines the critical challenge of balancing usability and security in digital system design. As organizations increasingly rely on digital platforms, the tension between creating user-friendly interfaces and ensuring robust security measures has become more pronounced.
Md Mehedi Hasan Emon, Md. Mazid-Ul-Haque
openaire   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Usable Security

2014
Simson Garfinkel   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy