Bureaucrats, emailconfirmed
1,221
edits
| Line 75: | Line 75: | ||
| *  Parallel Prototyping: [http://www.sigchi.org/chi95/proceedings/shortppr/so_bdy.htm 1995], [http://aaalab.stanford.edu/papers/Parallel_Prototyping_2010.pdf 2010] | *  Parallel Prototyping: [http://www.sigchi.org/chi95/proceedings/shortppr/so_bdy.htm 1995], [http://aaalab.stanford.edu/papers/Parallel_Prototyping_2010.pdf 2010] | ||
| *  Prototyping-Tools: [http://pencil.evolus.vn/ Pencil], [http://jquery.com/ jQuery] | *  Prototyping-Tools: [http://pencil.evolus.vn/ Pencil], [http://jquery.com/ jQuery] | ||
| * Security and Usability: The Case of passwords: [http://www.nngroup.com/articles/security-and-human-factors/ Norman/Nielsen on Sign-On-Usability], [http://www.cl.cam.ac.uk/~rja14/book.html | * Security and Usability: The Case of passwords: [http://www.nngroup.com/articles/security-and-human-factors/ Norman/Nielsen on Sign-On-Usability], [http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering, Chapter 2.4], [https://xkcd.com/936/ xkcd on password strength] | ||
| * [http://www.gaudior.net/alma/johnny.pdf Why Johnny can't encrypt] a classic Security/HCI paper.      | * [http://www.gaudior.net/alma/johnny.pdf Why Johnny can't encrypt] a classic Security/HCI paper.      | ||
| * Attacks based on Psychology, [http://www.cl.cam.ac.uk/~rja14/book.html|Security Engineering, Chapter 2.2]   | * Attacks based on Psychology, [http://www.cl.cam.ac.uk/~rja14/book.html|Security Engineering, Chapter 2.2]   | ||