共 11 条
- [1] [Anonymous], 2004, P 13 C USENIX SEC S
- [3] De Luca A., Proceedings of the 2012 AC M annual conference on Human Factors in Computing Systems, ser. CHI '12. New York, NY, USA: ACM, P987, DOI [DOI 10.1145/2208516.2208544, 10.1145/2208516.2208544]
- [4] FRANK M, 2013, SYSTEMS MAN CYBERN A, V8, P136, DOI DOI 10.1109/TIFS.2012.2225048
- [5] Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
- [7] Kim D, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1093
- [9] Rosenblatt S, 2013, TOUCH ID HACK VERIFI, V9
- [10] Sae-Bae N., 2012, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, P977, DOI DOI 10.1145/2207676.2208543