共 56 条
[12]
Chhabra R, 2017, PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), P36, DOI 10.1109/CONFLUENCE.2017.7943120
[13]
De Luca A., 2015, P 33 ANN ACM C HUM F
[15]
Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:750-761
[17]
Evaluating authentication options for mobile health applications in younger and older adults
[J].
PLOS ONE,
2018, 13 (01)
[18]
Hadid A, 2007, 2007 FIRST ACM/IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED SMART CAMERAS, P96
[19]
Hall MA, 1998, PROGRESS IN CONNECTIONIST-BASED INFORMATION SYSTEMS, VOLS 1 AND 2, P855