Пожалуйста, войдите в систему, чтобы принять участие в дискуссии (добавить собственные рецензию, или комментарий)
Цитировать эту публикацию
%0 Journal Article
%1 journals/ijsn/KuoPW09
%A Kuo, Cynthia
%A Perrig, Adrian
%A Walker, Jesse
%D 2009
%J Int. J. Secur. Networks
%K dblp
%N 1/2
%P 101-109
%T Designing user studies for security applications: a case study with wireless network configuration.
%U http://dblp.uni-trier.de/db/journals/ijsn/ijsn4.html#KuoPW09
%V 4
@article{journals/ijsn/KuoPW09,
added-at = {2020-04-01T00:00:00.000+0200},
author = {Kuo, Cynthia and Perrig, Adrian and Walker, Jesse},
biburl = {https://www.bibsonomy.org/bibtex/25391e9dbf1cfc3fd49619db70d8a39f0/dblp},
ee = {https://doi.org/10.1504/IJSN.2009.023429},
interhash = {08564975988dfa8d6dd74fc6e57c5d6a},
intrahash = {5391e9dbf1cfc3fd49619db70d8a39f0},
journal = {Int. J. Secur. Networks},
keywords = {dblp},
number = {1/2},
pages = {101-109},
timestamp = {2020-04-02T12:03:08.000+0200},
title = {Designing user studies for security applications: a case study with wireless network configuration.},
url = {http://dblp.uni-trier.de/db/journals/ijsn/ijsn4.html#KuoPW09},
volume = 4,
year = 2009
}