共 13 条
[1]
Andriotis Panagiotis, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P115, DOI 10.1007/978-3-319-07620-1_11
[2]
Andriotis P., 2013, Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, P1, DOI DOI 10.1145/2462096.2462098
[3]
Aviv AJ., 2010, P 4 USENIX C OFF TEC, V10, P1
[6]
Davies D. R., 2004, Proceedings of the Society of Feed Technologists, 2003, P1
[7]
Tao H., 2008, International Journal of Network Security, V7, P273, DOI DOI 10.6633/IJNS.200809.7(2).18
[8]
Uellenbeck S., 2013, CCS'13 Proc. 2013 ACM SIGSAC Conf. Comput. Commun. Secur, P161, DOI DOI 10.1145/2508859.2516700
[9]
von Zezschwitz E., 2013, PROC MOBILEHCI 13, P261, DOI DOI 10.1145/2493190.2493231
[10]
Easy to Draw, but Hard to Trace? On the Observability of Grid-based (Un) lock Patterns
[J].
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS,
2015,
:2339-2342