共 14 条
[1]
[Anonymous], 2012, NORDICHI 12 P 7 NORD
[2]
[Anonymous], 2012, P 2 ACM WORKSHOP SEC
[3]
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[4]
[Anonymous], 2013, P ANN INT C MOB SYST, DOI DOI 10.1145/2462456.2464460
[5]
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
[7]
Karlson Amy K., 2009, P SIGCHI C HUM FACT, P1647, DOI [10.1145/1518701.1518953, DOI 10.1145/1518701.1518953]
[10]
"She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households
[J].
34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016,
2016,
:5921-5932