Usable Security by Design: A Pattern Approach

Author(s):  
Bilal Naqvi ◽  
Jari Porras
2009 ◽  
Author(s):  
Justin Yurkovich ◽  
Roni Reiter-Palmon ◽  
Joseph M. James
Keyword(s):  

2012 ◽  
Vol 34 (1) ◽  
pp. 162-170 ◽  
Author(s):  
Mona Taghavi ◽  
Ahmed Patel ◽  
Nikita Schmidt ◽  
Christopher Wills ◽  
Yiqi Tew

2006 ◽  
Vol 35 (1) ◽  
pp. 11-17 ◽  
Author(s):  
Muzaffer Polat ◽  
Hasan Tekgul ◽  
Ahmet Kılıncer ◽  
Ayse Tosun ◽  
Semiha Terlemez ◽  
...  
Keyword(s):  

2016 ◽  
Vol 14 (5) ◽  
pp. 40-46 ◽  
Author(s):  
Matthew Green ◽  
Matthew Smith

2017 ◽  
Vol 42 (9) ◽  
pp. 2199-2218 ◽  
Author(s):  
Marc S. Levine ◽  
Stephen E. Rubesin
Keyword(s):  

2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Sign in / Sign up

Export Citation Format

Share Document