Human-centered authentication guidelines
نویسندگان
چکیده
منابع مشابه
Koranic Guidelines on Human-Information Interaction
Background and aim: Analyzing the newly-emerged field of human-information interaction (HII) needs to study the field from diferent aspects and perspectives. Religious literature, including among others the Koran is one of main resources for doing so. This study aimed to extract and explain the guidelines and main points related to HII by deeply reflecting on Koranic verses and chapters that re...
متن کاملAuthentication Components: Engineering Experiences and Guidelines
Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly integrated, while in other cases, such as EAP (Extensible Authentication Protocol) and Kerberos, they are separate and often implemented in different endpoints. However, careless application of this separation has lead to several vulnerabilitie...
متن کاملIdentifying Guidelines for Designing and Engineering Human-Centered Context-Aware Systems
In the ”future internet” environment that is generative and fosters innovation, applications are simplifying, are becoming mobile, are getting more social and user oriented. Software design capable of coping with such a generative environment that drives and supports innovation is still an issue. Some of the challenges of such systems include: empowering end-users with the necessary tools to mo...
متن کاملEvaluation of human-centered pedaling in the city of Galogah
The increasing population growth in urban areas has created adverse social, economic, environmental and physical impacts on cities. Therefore, cities must provide better places for life. One of these places is the creation of pedestrian streets. The purpose of this research is to find out the development of a pedestrian with a human-centered approach in the city of Golghah which has been select...
متن کاملHuman-Centered Computer Vision
Digital media are rapidly replacing their analog counterparts. This development is accompanied by (i) the increasing amount of images present on the Internet, (ii) the availability of the Internet for an increasing number of people, (iii) a decline in digital storage costs, and (iv) the developments in personal digital video/photo cam-era's [1, 2, 3]. In anticipation of these developments, the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Computer Security
سال: 2017
ISSN: 2056-4961
DOI: 10.1108/ics-04-2016-0034