Brooke, Phil; Paige, Richard - In: Information & Computer Security 23 (2015) 1, pp. 58-72
-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users. Design/methodology/approach – The authors … (non-expert IT users) carrying out typical tasks (web and email). …