共 11 条
[1]
[Anonymous], 2004, P 13 C USENIX SEC S
[3]
De Luca A., Proceedings of the 2012 AC M annual conference on Human Factors in Computing Systems, ser. CHI '12. New York, NY, USA: ACM, P987, DOI [DOI 10.1145/2208516.2208544, 10.1145/2208516.2208544]
[4]
FRANK M, 2013, SYSTEMS MAN CYBERN A, V8, P136, DOI DOI 10.1109/TIFS.2012.2225048
[5]
Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
[7]
Kim D, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1093
[9]
Rosenblatt S, 2013, TOUCH ID HACK VERIFI, V9
[10]
Sae-Bae N., 2012, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, P977, DOI DOI 10.1145/2207676.2208543