Bureaucrats, emailconfirmed
1,221
edits
| Line 75: | Line 75: | ||
* Parallel Prototyping: [http://www.sigchi.org/chi95/proceedings/shortppr/so_bdy.htm 1995], [http://aaalab.stanford.edu/papers/Parallel_Prototyping_2010.pdf 2010] | * Parallel Prototyping: [http://www.sigchi.org/chi95/proceedings/shortppr/so_bdy.htm 1995], [http://aaalab.stanford.edu/papers/Parallel_Prototyping_2010.pdf 2010] | ||
* Prototyping-Tools: [http://pencil.evolus.vn/ Pencil], [http://jquery.com/ jQuery] | * Prototyping-Tools: [http://pencil.evolus.vn/ Pencil], [http://jquery.com/ jQuery] | ||
* Security and Usability: The Case of passwords: [http://www.nngroup.com/articles/security-and-human-factors/ Norman/Nielsen on Sign-On-Usability], [http://www.cl.cam.ac.uk/~rja14/book.html | * Security and Usability: The Case of passwords: [http://www.nngroup.com/articles/security-and-human-factors/ Norman/Nielsen on Sign-On-Usability], [http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering, Chapter 2.4], [https://xkcd.com/936/ xkcd on password strength] | ||
* [http://www.gaudior.net/alma/johnny.pdf Why Johnny can't encrypt] a classic Security/HCI paper. | * [http://www.gaudior.net/alma/johnny.pdf Why Johnny can't encrypt] a classic Security/HCI paper. | ||
* Attacks based on Psychology, [http://www.cl.cam.ac.uk/~rja14/book.html|Security Engineering, Chapter 2.2] | * Attacks based on Psychology, [http://www.cl.cam.ac.uk/~rja14/book.html|Security Engineering, Chapter 2.2] | ||