Article,

In Search of Usable Security: Five Lessons from the Field

, , , and .
IEEE Security and Privacy, 2 (5): 19--24 (2004)
DOI: http://dx.doi.org/10.1109/MSP.2004.71

Meta data

Tags

Users

  • @gelahi

Comments and Reviews