共 26 条
- [1] Extended capabilities for visual cryptography [J]. THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
- [2] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
- [3] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
- [5] Robust Message Hiding for QR Code [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 520 - 523
- [7] Chin-Ho Chung, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P522, DOI 10.1109/IIH-MSP.2009.119
- [8] A Visual One-Time Password Authentication Scheme Using Mobile Devices [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 243 - 257
- [9] Denso Wave Incorporated, QRCODE COM
- [10] Falkner Stefanie, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P149, DOI 10.1007/978-3-319-07620-1_14