共 25 条
[2]
[Anonymous], 2014, authentication via touch biometrics: An experimental study on smartphones, P187
[3]
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI 10.1145/2335356.2335358
[4]
De Luca A., 2012, C HUM FACT COMP SYST
[5]
Derawi M. O., 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), P306, DOI 10.1109/IIHMSP.2010.83
[6]
Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:750-761
[7]
Feng T., 2014, TIPS CONTEXT AWARE I
[8]
Feng T, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P451, DOI 10.1109/THS.2012.6459891
[10]
Frontera-Pons J, 2012, IEEE IMAGE PROC, P113, DOI 10.1109/ICIP.2012.6466808