Skip to main navigation
Skip to search
Skip to main content
Teesside University's Research Portal Home
Home
Profiles
Research units
TeesRep
Student theses
Projects
Datasets
Press/Media
Search by expertise, name or affiliation
User-visible cryptography in email and web scenarios
Phillip Brooke, Richard Paige
Research output
:
Contribution to journal
›
Article
›
peer-review
308
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'User-visible cryptography in email and web scenarios'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Cryptography
100%
Cryptographic Mechanism
100%
Risk Mitigation
66%
Non-expert
66%
Deployable Mechanism
66%
User Stories
66%
Design Methodology
33%
Social Factors
33%
Fallback Procedure
33%
IT Users
33%
Electronic Commerce
33%
Risk Assessment
33%
Encryption
33%
User Behavior
33%
User Types
33%
Typical Tasks
33%
Large Population
33%
User Confidence
33%
User Involvement
33%
Trust Issues
33%
User Populations
33%
Holistic Review
33%
Computer Science
e-Mail
100%
Cryptographic Mechanism
100%
Practical Implication
33%
Social Implication
33%
User Involvement
33%
User Behavior
33%
Risk Mitigation
33%
User Population
33%