共 27 条
[1]
Barkan E, 2006, LECT NOTES COMPUT SC, V3897, P1
[2]
Bonneau J., 2012, 817 U CAMB COMP LAB
[3]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:553-567
[4]
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing
[J].
INFORMATION SECURITY AND PRIVACY, PT I,
2016, 9722
:409-425
[5]
A Visual One-Time Password Authentication Scheme Using Mobile Devices
[J].
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014,
2015, 8958
:243-257
[6]
Clarke D., 2002, Pervasive Computing. First International Conference, Pervasive 2002. Proceedings (Lecture Notes in Computer Science Vol.2414), P114
[7]
DeFigueiredo D., IEEE SECUR PRIV
[8]
Dmitrienko Alexandra, 2014, Intel Technology Journal, V18, P138
[9]
Dodson B., 2012, SECURE CONSUMER FRIE, P17