% This file was created with JabRef devel - 1st edition family.
% Encoding: MacRoman

@ARTICLE{1102917,
  author = {E. Bardram},
  title = {The trouble with login: on usability and computer security in ubiquitous computing},
  journal = {Personal Ubiquitous Comput.},
  year = {2005},
  volume = {9},
  pages = {357--367},
  number = {6},
  address = {London, UK},
  bdsk-url-1 = {http://dx.doi.org/10.1007/s00779-005-0347-6},
  doi = {http://dx.doi.org/10.1007/s00779-005-0347-6},
  issn = {1617-4909},
  publisher = {Springer-Verlag}
}

@INPROCEEDINGS{1137631,
  author = {Gustav Bostr\"{o}m and Jaana W\"{a}yrynen and Marine Bod\'{e}n and
	Konstantin Beznosov and Philippe Kruchten},
  title = {Extending XP practices to support security requirements engineering},
  booktitle = {SESS '06: Proceedings of the 2006 international workshop on Software
	engineering for secure systems},
  year = {2006},
  pages = {11--18},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137631},
  doi = {http://doi.acm.org/10.1145/1137627.1137631},
  file = {:/Volumes/iDisk/Freie Universität Berlin/Semester 9/Softwareprozesse/p11-bostrom.pdf:PDF},
  isbn = {1-59593-411-1},
  location = {Shanghai, China}
}

@INPROCEEDINGS{1132768,
  author = {Christina Braz and Jean-Marc Robert},
  title = {Security and usability: the case of the user authentication methods},
  booktitle = {IHM '06: Proceedings of the 18th International Conferenceof the Association
	Francophone d'Interaction Homme-Machine},
  year = {2006},
  pages = {199--203},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1132736.1132768},
  doi = {http://doi.acm.org/10.1145/1132736.1132768},
  isbn = {1-59593-350-6},
  location = {Montreal, Canada}
}

@INPROCEEDINGS{1137628,
  author = {Danilo Bruschi and Bart De Win and Mattia Monga},
  title = {Introduction to software engineering for secure systems: SESS06 --
	secure by design},
  booktitle = {SESS '06: Proceedings of the 2006 international workshop on Software
	engineering for secure systems},
  year = {2006},
  pages = {1--2},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137628},
  doi = {http://doi.acm.org/10.1145/1137627.1137628},
  isbn = {1-59593-411-1},
  location = {Shanghai, China}
}

@ARTICLE{1373163,
  author = {Elizabeth Churchill and Les Nelson and Diana K. Smetters},
  title = {Useful Computer Security},
  journal = {IEEE Internet Computing},
  year = {2008},
  volume = {12},
  pages = {10--12},
  number = {3},
  address = {Piscataway, NJ, USA},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MIC.2008.67},
  doi = {http://dx.doi.org/10.1109/MIC.2008.67},
  issn = {1089-7801},
  publisher = {IEEE Educational Activities Department}
}

@ARTICLE{820136,
  author = {Tony Clear},
  title = {Design and usability in security systems: daily life as a context
	of use?},
  journal = {SIGCSE Bull.},
  year = {2002},
  volume = {34},
  pages = {13--14},
  number = {4},
  address = {New York, NY, USA},
  bdsk-url-1 = {http://doi.acm.org/10.1145/820127.820136},
  doi = {http://doi.acm.org/10.1145/820127.820136},
  issn = {0097-8418},
  publisher = {ACM}
}

@BOOK{1098730,
  title = {Security and Usability},
  publisher = {O'Reilly Media, Inc.},
  year = {2005},
  author = {Lorrie Cranor and Simson Garfinkel},
  isbn = {0596008279}
}

@INPROCEEDINGS{1143122,
  author = {Alexander J. DeWitt and Jasna Kuljis},
  title = {Aligning usability and security: a usability study of Polaris},
  booktitle = {SOUPS '06: Proceedings of the second symposium on Usable privacy
	and security},
  year = {2006},
  pages = {1--7},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1143120.1143122},
  doi = {http://doi.acm.org/10.1145/1143120.1143122},
  isbn = {1-59593-448-0},
  location = {Pittsburgh, Pennsylvania}
}

@INPROCEEDINGS{1233448,
  author = {Cheryl Hinds and Chinedu Ekwueme},
  title = {Increasing security and usability of computer systems with graphical
	passwords},
  booktitle = {ACM-SE 45: Proceedings of the 45th annual southeast regional conference},
  year = {2007},
  pages = {529--530},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1233341.1233448},
  doi = {http://doi.acm.org/10.1145/1233341.1233448},
  isbn = {978-1-59593-629-5},
  location = {Winston-Salem, North Carolina}
}

@INPROCEEDINGS{1314293,
  author = {Mariusz H. Jakubowski and Ramarathnam Venkatesan},
  title = {Randomized radon transforms for biometric authentication via fingerprint
	hashing},
  booktitle = {DRM '07: Proceedings of the 2007 ACM workshop on Digital Rights Management},
  year = {2007},
  pages = {90--94},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1314276.1314293},
  doi = {http://doi.acm.org/10.1145/1314276.1314293},
  isbn = {978-1-59593-884-8},
  location = {Alexandria, Virginia, USA}
}

@INPROCEEDINGS{1358810,
  author = {Vassilis Kostakos},
  title = {Human-in-the-loop: rethinking security in mobile and pervasive systems},
  booktitle = {CHI '08: CHI '08 extended abstracts on Human factors in computing
	systems},
  year = {2008},
  pages = {3075--3080},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1358628.1358810},
  doi = {http://doi.acm.org/10.1145/1358628.1358810},
  isbn = {978-1-60558-012-X},
  location = {Florence, Italy}
}

@INPROCEEDINGS{1137636,
  author = {Martin Naedele and Thomas E. Koch},
  title = {Trust and tamper-proof software delivery},
  booktitle = {SESS '06: Proceedings of the 2006 international workshop on Software
	engineering for secure systems},
  year = {2006},
  pages = {51--58},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137636},
  doi = {http://doi.acm.org/10.1145/1137627.1137636},
  isbn = {1-59593-411-1},
  location = {Shanghai, China}
}

@INPROCEEDINGS{1182529,
  author = {Ann Nosseir and Richard Connor and Crawford Revie and Sotirios Terzis},
  title = {Question-based authentication using context data},
  booktitle = {NordiCHI '06: Proceedings of the 4th Nordic conference on Human-computer
	interaction},
  year = {2006},
  pages = {429--432},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1182475.1182529},
  doi = {http://doi.acm.org/10.1145/1182475.1182529},
  isbn = {1-59593-325-5},
  location = {Oslo, Norway}
}

@INPROCEEDINGS{1073004,
  author = {Rog\'{e}rio de Paula and Xianghua Ding and Paul Dourish and Kari
	Nies and Ben Pillet and David Redmiles and Jie Ren and Jennifer Rode
	and Roberto Silva Filho},
  title = {Two experiences designing for effective security},
  booktitle = {SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and
	security},
  year = {2005},
  pages = {25--34},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1073001.1073004},
  doi = {http://doi.acm.org/10.1145/1073001.1073004},
  isbn = {1-59593-178-3},
  location = {Pittsburgh, Pennsylvania}
}

@INPROCEEDINGS{00000000,
  author = {Konstantin Rozinov},
  title = {Are Usability and Security Two Opposite Directions in Computer Systems?},
  year = {2004},
  bdsk-url-1 = {http://rozinov.sfs.poly.edu/papers/security_vs_usability.pdf},
  date-added = {2009-02-23 04:41:08 +0100},
  date-modified = {2009-02-23 04:42:54 +0100},
  rating = {2}
}

@INPROCEEDINGS{1251435,
  author = {Alma Whitten and J. D. Tygar},
  title = {Why Johnny can't encrypt: a usability evaluation of PGP 5.0},
  booktitle = {SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium},
  year = {1999},
  pages = {14--14},
  address = {Berkeley, CA, USA},
  publisher = {USENIX Association},
  location = {Washington, D.C.}
}

@INPROCEEDINGS{1137633,
  author = {Bart De Win and Frank Piessens and Wouter Joosen},
  title = {How secure is AOP and what can we do about it?},
  booktitle = {SESS '06: Proceedings of the 2006 international workshop on Software
	engineering for secure systems},
  year = {2006},
  pages = {27--34},
  address = {New York, NY, USA},
  publisher = {ACM},
  bdsk-url-1 = {http://doi.acm.org/10.1145/1137627.1137633},
  doi = {http://doi.acm.org/10.1145/1137627.1137633},
  isbn = {1-59593-411-1},
  location = {Shanghai, China}
}

@ARTICLE{1025014,
  author = {Jeff Yan and Alan Blackwell and Ross Anderson and Alasdair Grant},
  title = {Password Memorability and Security: Empirical Results},
  journal = {IEEE Security and Privacy},
  year = {2004},
  volume = {2},
  pages = {25--31},
  number = {5},
  address = {Piscataway, NJ, USA},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MSP.2004.81},
  doi = {http://dx.doi.org/10.1109/MSP.2004.81},
  issn = {1540-7993},
  publisher = {IEEE Educational Activities Department}
}

@ARTICLE{10250999,
  author = {von Hippel, Eric and Reagle, Jr., Joseph M. and Sherry, John F., Jr. and van den Huevel, Jr., Johan A},
  title = {Article with complex Authornames},
  journal = {IEEE Security and Privacy},
  year = {2004},
  volume = {2},
  pages = {25--31},
  number = {5},
  address = {Piscataway, NJ, USA},
  bdsk-url-1 = {http://dx.doi.org/10.1109/MSP.2004.81},
  doi = {http://dx.doi.org/10.1109/MSP.2004.81},
  issn = {1540-7993},
  publisher = {IEEE Educational Activities Department}
}

