共 37 条
[1]
[Anonymous], 2009, USENIX SECUR S
[2]
[Anonymous], 2009, MEDIA FORENSICS SECU, DOI DOI 10.1117/12.805701
[3]
Addressing Smartphone-based Multi-factor Authentication via Hardware-rooted Technologies
[J].
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017),
2017,
:1910-1914
[4]
Bojinov H., 2014, Mobile Device Identification via Sensor Fingerprinting
[5]
Wireless Device Identification with Radiometric Signatures
[J].
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING,
2008,
:116-+
[7]
Wireless Device Authentication Using Acoustic Hardware Fingerprints
[J].
BIG DATA COMPUTING AND COMMUNICATIONS,
2015, 9196
:193-204
[8]
CHEN M., 2007, ELECT IMAGING 2007
[10]
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
[J].
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017),
2017,
:183-195