@dblp

Designing user studies for security applications: a case study with wireless network configuration.

, , and . Int. J. Secur. Networks, 4 (1/2): 101-109 (2009)

Links and resources

Tags