Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 76
1.
  • Comparative Analysis and Fr... Comparative Analysis and Framework Evaluating Web Single Sign-on Systems
    Alaca, Furkan; Oorschot, Paul C. Van ACM computing surveys, 09/2021, Volume: 53, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    We perform a comprehensive analysis and comparison of 14 web single sign-on (SSO) systems proposed and/or deployed over the past decade, including federated identity and credential/password ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
2.
  • ROSTAM: A passwordless web ... ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
    Mahnamfar, Amin; Bicakci, Kemal; Uzunay, Yusuf Computers & security, April 2024, 2024-04-00, Volume: 139
    Journal Article
    Peer reviewed
    Open access

    The challenge of achieving passwordless user authentication is real given the prevalence of web applications that keep asking passwords. Complicating this issue further, in an enterprise environment, ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • The Factors Influencing the... The Factors Influencing the Use of Password Managers
    Alshahrani, Hussain; Alghamdi, Abdulrahman Journal of Information Security and Cybercrimes Research (Online), 6/2022, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This paper investigates the factors that influence the actual use of password managers. In this paper, we have integrated some factors from the Technology Acceptance Model (perceived ease of use, ...
Full text
Available for: NUK, UL, UM, UPUK
4.
  • Why Do Not We Use Password ... Why Do Not We Use Password Managers? A Study on the Intention to Use Password Managers
    Ramakrishna Ayyagari; Jaejoo Lim; Olger Hoxha Contemporary Management Research, 202001, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed

    Why don't individuals follow the best information security practices? We address an aspect of this question by focusing on one of the most common authentication methods – passwords. To promote better ...
Full text
Available for: CEKLJ, FFLJ, IZUM, KILJ, NUK, ODKLJ, PILJ, PNG, SAZU, UL, UM, UPUK
5.
  • Exploring the effect of unc... Exploring the effect of uncertainty avoidance on taking voluntary protective security actions
    Aurigemma, Salvatore; Mattson, Thomas Computers & security, 03/2018, Volume: 73
    Journal Article
    Peer reviewed

    In this paper, we investigate the main and qualifying effect of Hofstede's uncertainty avoidance dimension (i.e., a culture's acceptance of ambiguous or uncertain situations) of national culture on ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
6.
  • Understanding Dynamics of I... Understanding Dynamics of Initial Trust and its Antecedents in Password Managers Adoption Intention among Young Adults
    Farooq, Ali; Dubinina, Alina; Virtanen, Seppo ... Procedia computer science, 2021, 2021-00-00, Volume: 184
    Journal Article
    Peer reviewed
    Open access

    Security professionals often suggest password managers as one of the best measures for the end-users. However, the end-users have shown reluctance in adopting them, mostly due to the trust factor. ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
7.
  • Why Do Not We Use Password ... Why Do Not We Use Password Managers? A Study on the Intention to Use Password Managers
    Ayyagari, Ramakrishna; Lim, Jaejoo; Hoxha, Olger Contemporary management research, 2020, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Why don't individuals follow the best information security practices? We address an aspect of this question by focusing on one of the most common authentication methods – passwords. To promote better ...
Full text
Available for: CEKLJ, FFLJ, IZUM, KILJ, NUK, ODKLJ, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
8.
  • Phishing Attacks on Modern ... Phishing Attacks on Modern Android
    Aonzo, Simone; Merlo, Alessio; Tavella, Giulio ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 10/2018
    Conference Proceeding

    Modern versions of Android have introduced a number of features in the name of convenience. This paper shows how two of these features, mobile password managers and Instant Apps, can be abused to ...
Full text
Available for: NUK, UL
9.
  • "I don't see why I would ev... "I don't see why I would ever want to use it"
    Seiler-Hwang, Sunyoung; Arias-Cabarcos, Patricia; Marín, Andrés ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/2019
    Conference Proceeding

    Passwords are an often unavoidable authentication mechanism, despite the availability of additional alternative means. In the case of smartphones, usability problems are aggravated because ...
Full text
Available for: NUK, UL
10.
  • Effect of long-term orienta... Effect of long-term orientation on voluntary security actions
    Aurigemma, Salvatore; Mattson, Thomas Information and computer security, 03/2019, Volume: 27, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Purpose This paper aims to examine the impact an individual’s long-term orientation (a cultural dimension) has on their attitude, behavioral intention and actual voluntary security actions taken in ...
Full text
Available for: CEKLJ, NUK, UL, UM, UPUK
1 2 3 4 5
hits: 76

Load filters