共 26 条
[2]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[3]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]
Robust Message Hiding for QR Code
[J].
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014),
2014,
:520-523
[7]
Chin-Ho Chung, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P522, DOI 10.1109/IIH-MSP.2009.119
[8]
A Visual One-Time Password Authentication Scheme Using Mobile Devices
[J].
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014,
2015, 8958
:243-257
[9]
Denso Wave Incorporated, QRCODE COM
[10]
Falkner Stefanie, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P149, DOI 10.1007/978-3-319-07620-1_14