Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: magazinearticle
|
Aligning security and usabilityYee, Ka-PingIEEE security & privacy, 2004-09, Vol.2 (5), p.48-55New York: IEEETexto completo disponível |
|
2 |
Material Type: magazinearticle
|
Helping Users Deal with Digital Threats: The Online User Supervision ArchitectureFernandez Villamor, Antonio Manuel ; Yelmo, Juan C.IEEE security & privacy, 2011-11, Vol.9 (6), p.29-35IEEETexto completo disponível |
|
3 |
Material Type: magazinearticle
|
Toward a Multi-Tenancy Authorization System for Cloud ServicesCalero, Jose M. Alcaraz ; Edwards, Nigel ; Kirschnick, Johannes ; Wilcock, Lawrence ; Wray, MikeIEEE security & privacy, 2010-11, Vol.8 (6), p.48-55New York: IEEETexto completo disponível |
|
4 |
Material Type: magazinearticle
|
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?Ali, Mohammed Aamir ; Arief, Budi ; Emms, Martin ; van Moorsel, AadIEEE security & privacy, 2017-03, Vol.15 (2), p.78-86IEEETexto completo disponível |
|
5 |
Material Type: magazinearticle
|
Overview of IEEE 802.16 securityJohnston, D. ; Walker, J.IEEE security & privacy, 2004-05, Vol.2 (3), p.40-48New York: IEEETexto completo disponível |
|
6 |
Material Type: magazinearticle
|
Secure Neighbor Discovery: Review, Challenges, Perspectives, and RecommendationsAlSa'deh, Ahmad ; Meinel, ChristophIEEE security & privacy, 2012-07, Vol.10 (4), p.26-34New York: IEEETexto completo disponível |
|
7 |
Material Type: magazinearticle
|
It Depends on What You PaySchneider, F.B.IEEE security & privacy, 2005-05, Vol.3 (3), p.3-3New York: IEEETexto completo disponível |
|
8 |
Material Type: magazinearticle
|
The Seven Flaws of Identity Management: Usability and Security ChallengesDhamija, Rachna ; Dusseault, LisaIEEE security & privacy, 2008-03, Vol.6 (2), p.24-29New York: IEEETexto completo disponível |
|
9 |
Material Type: magazinearticle
|
Accountability for PerfectionSchneider, Fred B.IEEE security & privacy, 2009-03, Vol.7 (2), p.3-4New York: IEEETexto completo disponível |
|
10 |
Material Type: magazinearticle
|
Some Like It Private: Sharing Confidential Information Based on Oblivious AuthorizationDe Cristofaro, Emiliano ; Kim, JihyeIEEE security & privacy, 2010-07, Vol.8 (4), p.18-24New York: IEEETexto completo disponível |