Found: 5
Select item for more details and to access through your institution.
On the misuse of graphical user interface elements to implement security controls.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 59, doi. 10.1515/itit-2016-0036
- By:
- Publication type:
- Article
Extending .NET security to unmanaged code.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 6, p. 417, doi. 10.1007/s10207-007-0031-0
- By:
- Publication type:
- Article
Protecting Users against Phishing Attacks.
- Published in:
- Computer Journal, 2006, v. 49, n. 5, p. 554, doi. 10.1093/comjnl/bxh169
- By:
- Publication type:
- Article
A Service Architecture for Mobile Teamwork.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2003, v. 13, n. 4, p. 447, doi. 10.1142/S0218194003001342
- By:
- Publication type:
- Article
A Generic Content-Management Tool for Web Databases.
- Published in:
- IEEE Internet Computing, 2002, v. 6, n. 4, p. 38, doi. 10.1109/MIC.2002.1020324
- By:
- Publication type:
- Article