Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Edina Hatunic-Webster"'
Publikováno v:
International Journal for Information Security Research. 5:529-537
Phishing takes advantage of the way humans interact with computers or interpret messages. A security ceremony is one way of extending the reach of current methods for social, technical and contextual analysis of security protocols to include humans.
Publikováno v:
ICITST
Phishing takes advantage of the way humans interact with computers or interpret messages; and also that many online authentication protocols place a disproportional burden on human abilities. A security ceremony is an extension of the concept of netw