共 26 条
[1]
Ben-Asher N., P 13 INT C HUMAN COM, P465, DOI DOI 10.1145/2037373.2037442
[2]
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1
[4]
Felt AdriennePorter., 2012, P 8 S USABLE PRIVACY, p3:1
[5]
Harris M.A., 2014, Journal of Information Privacy and Security, V10, P186, DOI [10.1080/15536548.2014.974429, DOI 10.1080/15536548.2014.974429]
[6]
Hasan Basel, 2016, PROPOSED MODEL USER, P97
[7]
Kovelamudi G., 2016, 2016 IEEECIC INT C C, P1, DOI [10.1109/ICCChina.2016.7636862, DOI 10.1109/ICCCHINA.2016.7636862]