Advertisement

Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion)

  • Frank StajanoEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)

Abstract

I spoke about Pico in 2011 at this workshop. This is not about how to build it, but how to bootstrap adoption of the Pico password replacement system. All the researchers in the Pico team who have contributed to this work, whose names are on this opening slide, are here today. In 2011 Pico was just a dream and I’m very glad now to have been able to recruit people that made this into something real that we want people to actually use.

Keywords

Mobile Phone Vicious Circle Trojan Horse Content Management System Docking Station 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.University of CambridgeCambridgeUK

Personalised recommendations