Author of the publication

Usable security of authentication process: New approach and practical assessment.

, and . ICITST, page 179-180. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task Design: Its Impact on Usability Testing., and . ICIW, page 583-589. IEEE Computer Society, (2008)Assessing the Usability of Learning Management System: User Experience Study., and . eLEOT, volume 160 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 9-18. Springer, (2015)Usable security of authentication process: New approach and practical assessment., and . ICITST, page 179-180. IEEE, (2015)Lessons in the application of systems analysis in developing countries., and . ECIS, page 175-194. Nijenrode University Press, (1994)An Alternative Prototyping Classification., and . Comput. J., 30 (6): 481-484 (1987)Designers' Perspective of Website Usability: The Cultural Dimension., and . ICWI, page 485-494. IADIS, (2004)Software Prototyping: Implications for the People Involved in Systems Development.. CAiSE, volume 436 of Lecture Notes in Computer Science, page 290-305. Springer, (1990)Security and usability of authenticating process of online banking: User experience study., and . ICCST, page 1-6. IEEE, (2014)In Favour of System Prototypes and their Integration into the Systems Development Cycle., and . Comput. J., 26 (1): 36-42 (1983)Generating a Domain Specific Inspection Evaluation Method through an Adaptive Framework. International Journal of Advanced Computer Science and Applications(IJACSA), (2013)