Ivan Flechais
Ivan Flechais
Verifierad e-postadress på cs.ox.ac.uk - Startsida
Titel
Citeras av
Citeras av
År
Usable security: Why do we need it? How do we get it?
MA Sasse, I Flechais
O'Reilly, 2005
1492005
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 International Conference on Availability, Reliability and Security, 275-282, 2010
1402010
Usability and security of out-of-band channels in secure device pairing protocols
R Kainda, I Flechais, AW Roscoe
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
1242009
Bringing security home: a process for developing secure and usable systems
I Flechais, MA Sasse, SMV Hailes
Proceedings of the 2003 workshop on New security paradigms, 49-57, 2003
1172003
Integrating security and usability into the requirements and design process
I Flechais, C Mascolo, MA Sasse
International Journal of Electronic Security and Digital Forensics 1 (1), 12-26, 2007
1062007
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
972011
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
LH Nguyen, AW Roscoe
Journal of Computer Security 19 (1), 139-201, 2011
732011
Designing secure and usable systems
I Fléchais
University College London, 2005
652005
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
I Flechais, J Riegelsberger, MA Sasse
Proceedings of the 2005 workshop on New security paradigms, 33-41, 2005
582005
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
I Flechais, MA Sasse
International Journal of Human-Computer Studies 67 (4), 281-296, 2009
432009
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
422010
Two heads are better than one: security and usability of device associations in group scenarios
R Kainda, I Flechais, AW Roscoe
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-13, 2010
372010
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
British Computer Society, 2010
342010
Here's Johnny: a methodology for developing attacker personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Fléchais
2011 Sixth International Conference on Availability, Reliability and …, 2011
292011
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
International Conference on Human-Centred Software Engineering, 111-118, 2010
292010
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Fléchais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
292010
Human vulnerabilities in security systems
MA Sasse, D Ashenden, D Lawrence, L Coles-Kemp, I Fléchais, ...
Human Factors Working Group, Cyber Security KTN Human Factors White Paper, 2007
282007
Human interactive secure key and identity exchange protocols in body sensor networks
X Huang, B Chen, A Markham, Q Wang, Z Yan, AW Roscoe
IET Information Security 7 (1), 30-38, 2013
262013
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
232011
Designing and aligning e‐Science security culture with design
SM Furnell, N Clarke, R von Solms, S Faily, I Fléchais
Information Management & Computer Security, 2010
202010
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20